isec-tugraz / sgxropLinks
The code to the SGX-ROP paper
☆184Updated 5 years ago
Alternatives and similar repositories for sgxrop
Users that are interested in sgxrop are comparing it to the libraries listed below
Sorting:
- ☆172Updated 3 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆112Updated 6 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- ☆149Updated 6 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- A practical attack framework for precise enclave execution control☆459Updated 2 months ago
- Notes on various topics I'm interested in☆160Updated 9 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- ☆183Updated 4 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆378Updated 6 years ago
- Spectre attack against SGX enclave☆237Updated 7 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆223Updated 3 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 11 months ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆257Updated last month
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆185Updated 6 years ago
- ☆55Updated 2 years ago
- ☆77Updated 7 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆219Updated 4 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆135Updated 6 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆122Updated 8 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- Code and exercises for a workshop on z3 and angr☆228Updated 4 years ago
- Proof of concept code for the Spectre CPU exploit.☆306Updated 2 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year