gregvish / l1tf-pocLinks
L1TF (Foreshadow) VM guest to host memory read PoC
☆112Updated 6 years ago
Alternatives and similar repositories for l1tf-poc
Users that are interested in l1tf-poc are comparing it to the libraries listed below
Sorting:
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 7 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- ☆55Updated 3 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- run AFL with pintool☆66Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- A quick PoC to try out the "meltdown" timing attack.☆155Updated 7 years ago
- ☆86Updated last year
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆187Updated 6 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- ☆49Updated 7 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- ☆91Updated 6 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- ☆36Updated 4 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆304Updated last year
- A function tracer☆91Updated 6 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- An interactive memory info for pwning / exploiting☆102Updated 2 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- ☆90Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆216Updated last month
- Cisco MIPS debugger☆59Updated 7 years ago
- WinHeap Explorer repository.☆120Updated 6 years ago