gregvish / l1tf-poc
L1TF (Foreshadow) VM guest to host memory read PoC
☆112Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for l1tf-poc
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆110Updated 6 years ago
- ☆55Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆73Updated 5 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆78Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆165Updated 8 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆147Updated 6 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 6 years ago
- kCFI Documentation☆14Updated 7 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆204Updated 3 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 2 years ago
- Some low-level stuff☆104Updated 6 months ago
- run AFL with pintool☆65Updated 4 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆64Updated 8 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 6 years ago
- ☆35Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆212Updated last month
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆119Updated 4 years ago
- Proof-of-concept for the ZombieLoad and RIDL attacks☆23Updated 5 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 9 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 3 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆81Updated 7 months ago
- Cisco MIPS debugger☆59Updated 6 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago