gfw-report / ndss25-wallbleedView external linksLinks
This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": https://gfw.report/publications/ndss25/en/
☆51Mar 6, 2025Updated 11 months ago
Alternatives and similar repositories for ndss25-wallbleed
Users that are interested in ndss25-wallbleed are comparing it to the libraries listed below
Sorting:
- Cybersecurity Psychology Framework☆19Updated this week
- ☆14Jul 9, 2024Updated last year
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Nov 10, 2025Updated 3 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- An offensive toolkit for restless guests #DEFCON33☆54Aug 11, 2025Updated 6 months ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆72Sep 8, 2025Updated 5 months ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 3 months ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆69Dec 31, 2025Updated last month
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 5 months ago
- ☆13Jan 28, 2026Updated 2 weeks ago
- Luthier, a GPU binary instrumentation tool for AMD GPUs☆26Updated this week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Parses BGP/AS data from multiple different sources☆11Dec 4, 2021Updated 4 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- Specification to describe the minimum information standard for online community data. Guidelines for describing data about online communi…☆11Sep 19, 2016Updated 9 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Sep 1, 2023Updated 2 years ago
- Argument Mining Python implementation☆13Jul 28, 2023Updated 2 years ago
- A disassembler for 8080 byte code running as a static browser based application with no server components☆14Apr 23, 2024Updated last year
- Open Source License Compliance Checklists☆11Oct 18, 2024Updated last year
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- PC based on 65816☆16Jul 9, 2022Updated 3 years ago
- sineQL is a web API query language that mimics graphQL, designed solely for fun.☆10Jan 27, 2026Updated 2 weeks ago
- Serialize ngraph.graph to binary format☆10Oct 9, 2025Updated 4 months ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- ☆10May 12, 2022Updated 3 years ago
- Security research organization dedicated to finding low hanging, critical, vulnerabilities.☆15May 12, 2022Updated 3 years ago
- ZX81 for MiSTer☆12Dec 9, 2025Updated 2 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Ben Eaters SAP-1 Architecture Implemented by Me.☆13May 17, 2023Updated 2 years ago
- ☆20Sep 11, 2025Updated 5 months ago
- ☆15Dec 11, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Finite-element library for analysis and adjoint-based gradient evaluation☆11Feb 6, 2026Updated last week
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- ☆11Dec 19, 2024Updated last year
- ☆12Oct 22, 2023Updated 2 years ago