isec-tugraz / sgxropLinks
The code to the SGX-ROP paper
☆184Updated 5 years ago
Alternatives and similar repositories for sgxrop
Users that are interested in sgxrop are comparing it to the libraries listed below
Sorting:
- ☆172Updated 3 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 9 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 7 years ago
- ☆152Updated 7 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- Spectre attack against SGX enclave☆237Updated 7 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- ☆183Updated 4 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 7 years ago
- ☆77Updated 7 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆188Updated 6 years ago
- A practical attack framework for precise enclave execution control☆462Updated 5 months ago
- Notes on various topics I'm interested in☆160Updated 10 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 4 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- Tear the firmware apart with your bare hands;-)☆191Updated 2 months ago
- ☆23Updated 6 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- grap: define and match graph patterns within binaries☆172Updated 4 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆219Updated 3 months ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆262Updated 2 months ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 3 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago