jprx / DEFCON30-PACMANView external linksLinks
Materials from the DEF CON 30 talk on PACMAN
☆34Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for DEFCON30-PACMAN
Users that are interested in DEFCON30-PACMAN are comparing it to the libraries listed below
Sorting:
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆48Aug 12, 2022Updated 3 years ago
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- M1 bare metal project in Rust☆31Sep 1, 2022Updated 3 years ago
- An IOKit kext designed for microarchitectural security research on M1☆46Oct 30, 2022Updated 3 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆59Feb 3, 2026Updated last week
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆38Sep 6, 2022Updated 3 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆32Jul 2, 2025Updated 7 months ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- ☆13Apr 13, 2023Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆176Jan 23, 2024Updated 2 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Aug 9, 2024Updated last year
- Example payload for CVE-2022-21894☆15Sep 27, 2023Updated 2 years ago
- d☆14Sep 5, 2025Updated 5 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- ☆18Mar 28, 2023Updated 2 years ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- ☆75Mar 11, 2024Updated last year
- ☆70Jul 4, 2024Updated last year
- Use hardware performance counters to find mapping of addresses to L3 slices in Intel processors☆17Jul 30, 2023Updated 2 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- extract various firmware blobs from iBoot☆48Oct 4, 2020Updated 5 years ago
- ☆27Nov 30, 2024Updated last year
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆54Mar 9, 2025Updated 11 months ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆121Apr 12, 2022Updated 3 years ago
- Ghidra loader for decrypted iBoot, LLB, iBEC, iBSS and SecureROM images☆23Mar 25, 2022Updated 3 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Dec 23, 2025Updated last month
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.☆23Dec 19, 2024Updated last year
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆36Oct 17, 2025Updated 3 months ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- ☆23Jul 28, 2023Updated 2 years ago
- ☆24Apr 30, 2023Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 8 months ago
- ☆16Dec 3, 2024Updated last year