gregvish / l1tf-pocLinks
L1TF (Foreshadow) VM guest to host memory read PoC
☆114Updated 7 years ago
Alternatives and similar repositories for l1tf-poc
Users that are interested in l1tf-poc are comparing it to the libraries listed below
Sorting:
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆167Updated 9 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Updated 6 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Updated 7 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Updated 7 years ago
- A DBI tool to discover heap memory related bugs☆126Updated 7 years ago
- ☆56Updated 3 years ago
- Attacking the Core associated source files☆89Updated 8 years ago
- run AFL with pintool☆66Updated 5 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- Using LibVMI to detect malware☆32Updated 3 years ago
- ☆91Updated 6 years ago
- ☆74Updated 5 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- ☆49Updated 7 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆97Updated 9 years ago
- ☆50Updated 8 years ago
- ☆61Updated 9 years ago
- An interactive memory info for pwning / exploiting☆98Updated 2 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)☆26Updated 5 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- A Python tool to generate ROP chains☆65Updated 11 months ago
- Some low-level stuff☆109Updated last year