gfw-report / ndss25-wallbleedLinks
This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": https://gfw.report/publications/ndss25/en/
☆31Updated 3 months ago
Alternatives and similar repositories for ndss25-wallbleed
Users that are interested in ndss25-wallbleed are comparing it to the libraries listed below
Sorting:
- PoC for PixieFail vulnerabilities☆23Updated last year
- NVidia sass disassembler☆16Updated this week
- A library for intercepting system calls☆94Updated 5 months ago
- ☆16Updated 9 months ago
- Sigma Virtual Machine.☆22Updated last year
- Userspace/GPU eBPF VM with llvm JIT/AOT compiler☆70Updated last week
- Proof-of-concept for the GhostWrite CPU bug.☆113Updated 9 months ago
- Hook for the PoC for exploiting CVE-2024-32002☆16Updated last year
- The public release of LeftoverLocals code☆66Updated last year
- libLISA: Instruction Discovery and Analysis on x86-64☆113Updated 3 months ago
- Code used in blog posts☆34Updated 3 weeks ago
- Student Starter Code for Secure Hardware Design at MIT☆75Updated last year
- ☆32Updated this week
- ☆16Updated 3 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆16Updated 3 months ago
- Build your own cloud virtual machine lab☆12Updated 7 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆61Updated 9 months ago
- Towards Sound Reassembly of Modern x86-64 Binaries (ASPLOS'25)☆14Updated 2 months ago
- QARMA block cipher in C☆30Updated 2 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated last week
- Disable SSL certificate verification for all binaries that use libssl☆49Updated 2 years ago
- Spectre based on Linear Address Masking☆69Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆13Updated 2 weeks ago
- CHERI ISA Specification☆24Updated 10 months ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆69Updated last year
- ☆31Updated 4 years ago
- Overview of Secure-Launch process on Qualcomm devices☆59Updated last year