isec-tugraz / ZombieLoad
Proof-of-concept for the ZombieLoad attack
☆813Updated 3 years ago
Alternatives and similar repositories for ZombieLoad:
Users that are interested in ZombieLoad are comparing it to the libraries listed below
- VirtualBox E1000 Guest-to-Host Escape☆1,409Updated 6 years ago
- RIDL test suite and exploits☆355Updated 4 years ago
- Avast JavaScript Interactive Shell☆670Updated 5 years ago
- ☆468Updated 5 months ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆624Updated 4 years ago
- Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace☆785Updated 2 months ago
- Intel Management Engine JTAG Proof of Concept☆520Updated 4 years ago
- This repository contains several applications, demonstrating the Meltdown bug.☆4,134Updated 2 years ago
- A Pwn2Own exploit chain☆761Updated 6 years ago
- Hardware backdoors in some x86 CPUs☆2,363Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆896Updated 4 years ago
- Interactive CTF Exploration Tool☆1,655Updated 3 years ago
- ☆251Updated 4 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆293Updated 2 years ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆866Updated 5 years ago
- The code to the SGX-ROP paper☆183Updated 5 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- Analysis of public exploits or my 1day exploits☆617Updated 4 years ago
- ☆183Updated 4 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 6 months ago
- Some helpful preload libraries for pwning stuff.☆1,610Updated 3 months ago
- mXtract - Memory Extractor & Analyzer☆591Updated 3 years ago
- Meltdown Exploit PoC☆947Updated 7 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆728Updated 2 years ago
- Proof of Concepts (PE, PDF...)☆1,500Updated 4 months ago
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities☆408Updated 4 years ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,667Updated last year
- A Javascript library for browser exploitation☆883Updated 6 years ago
- My proof-of-concept exploits for the Linux kernel☆1,470Updated 3 years ago