gfw-report / ndss25-wallbleedView external linksLinks
This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": https://gfw.report/publications/ndss25/en/
☆51Mar 6, 2025Updated 11 months ago
Alternatives and similar repositories for ndss25-wallbleed
Users that are interested in ndss25-wallbleed are comparing it to the libraries listed below
Sorting:
- Cybersecurity Psychology Framework☆19Feb 8, 2026Updated last week
- ☆11Jul 15, 2024Updated last year
- ☆14Jul 9, 2024Updated last year
- ☆20Oct 19, 2022Updated 3 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 9 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Nov 10, 2025Updated 3 months ago
- An offensive toolkit for restless guests #DEFCON33☆54Aug 11, 2025Updated 6 months ago
- Monorepo for infrastructure and challenges of SECedu CTF 2019.☆28Jul 13, 2020Updated 5 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆72Sep 8, 2025Updated 5 months ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆69Dec 31, 2025Updated last month
- ☆38May 31, 2024Updated last year
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 5 months ago
- Parses BGP/AS data from multiple different sources☆11Dec 4, 2021Updated 4 years ago
- Circuit PSI using garbled cuckoo filter☆11Dec 21, 2022Updated 3 years ago
- ☆13Jan 28, 2026Updated 2 weeks ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- 🧢 La gazette du logiciel libre dans/pour l'administration☆37Dec 5, 2024Updated last year
- Schedule Conflict Resolver☆13Nov 27, 2017Updated 8 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- (SIGIR 25) Repo for "Review-driven Personalized Preference Reasoning with Large Language Models for Recommendation"☆10Jan 18, 2025Updated last year
- Federal Cloud Computing Strategy Website☆15Oct 6, 2022Updated 3 years ago
- ☆10May 12, 2022Updated 3 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Syllabus for "Anthropology of Silicon Valley(s)" course☆15Apr 24, 2017Updated 8 years ago
- SMD-Lötstation mit Steuerung über ESP8266☆12Nov 3, 2020Updated 5 years ago
- Security research organization dedicated to finding low hanging, critical, vulnerabilities.☆15May 12, 2022Updated 3 years ago
- ☆20Sep 11, 2025Updated 5 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Sep 1, 2023Updated 2 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- PC based on 65816☆16Jul 9, 2022Updated 3 years ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 2 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- View the conference schedule of the Chaos Communcation Camp 2011☆12Jan 2, 2017Updated 9 years ago