itewqq / SGX-PTE-SPYLinks
A migration for the page table entry based side-channel attack agains SGX enclaves.
☆19Updated 7 months ago
Alternatives and similar repositories for SGX-PTE-SPY
Users that are interested in SGX-PTE-SPY are comparing it to the libraries listed below
Sorting:
- ☆75Updated last year
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- ☆23Updated 10 months ago
- Binary exploitation by confusing the unwinder☆65Updated 2 years ago
- Spectre based on Linear Address Masking☆69Updated last year
- ☆38Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆63Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆18Updated last year
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- ☆60Updated 7 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Proof-of-concept for the GhostWrite CPU bug.☆116Updated last year
- ☆132Updated 2 weeks ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆31Updated 3 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆37Updated 10 months ago
- Kernel Read Write Execute☆46Updated 8 months ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆34Updated 5 months ago
- A tool to perform so called BGE attack☆25Updated 3 months ago
- Integer overflow in FreeType software, which also affects Chrome☆19Updated last month
- Binary Only Thread Sanitizer☆15Updated last year
- ☆36Updated last year
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆46Updated 2 years ago
- ☆20Updated 2 years ago
- ☆60Updated last year
- Intel Hardware Trace Library - Kernel Space Componment☆71Updated 5 months ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago