isec-tugraz / sgxropLinks
The code to the SGX-ROP paper
☆185Updated 5 years ago
Alternatives and similar repositories for sgxrop
Users that are interested in sgxrop are comparing it to the libraries listed below
Sorting:
- ☆185Updated 4 years ago
- ☆174Updated 3 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Updated 7 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆168Updated 9 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- TPM-Fail Attack code & data☆124Updated 2 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- A practical attack framework for precise enclave execution control☆466Updated 2 months ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Updated 6 years ago
- ☆152Updated 7 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆223Updated 4 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆188Updated 6 years ago
- ☆77Updated 7 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆155Updated 2 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- ☆56Updated 3 years ago
- Notes on various topics I'm interested in☆161Updated last month
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- grap: define and match graph patterns within binaries☆174Updated 4 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆264Updated this week
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Updated 9 years ago
- ☆23Updated 6 years ago
- X41 Smartcard Fuzzer☆120Updated 7 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 5 years ago
- Implementation of the SMM rootkit "The Watcher"☆131Updated 3 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆193Updated 8 years ago