jprx / PacmanFinder
A Ghidra static analysis tool for locating PACMAN Gadgets
☆13Updated 2 years ago
Alternatives and similar repositories for PacmanFinder:
Users that are interested in PacmanFinder are comparing it to the libraries listed below
- An IOKit kext designed for microarchitectural security research on M1☆41Updated 2 years ago
- M1 bare metal project in Rust☆30Updated 2 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆40Updated 2 years ago
- Materials from the DEF CON 30 talk on PACMAN☆31Updated 2 years ago
- Patch your macOS kernel to enable support for the high-resolution timers on M1☆30Updated last year
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆48Updated last year
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- Linux kernel branches for confidential compute research☆17Updated this week
- ☆23Updated last year
- A tool combining DWARF info and source to search for kernel heap objects☆22Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆55Updated 11 months ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- ☆20Updated 6 months ago
- Target components for kAFL/Nyx Fuzzer☆27Updated 2 weeks ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆31Updated 4 years ago
- ☆71Updated last year
- An XNU kernel race condition bug☆41Updated 2 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆45Updated 2 months ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆59Updated 2 weeks ago
- ☆37Updated 11 months ago
- Code of KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations (USENIX Security'23)☆78Updated last year
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆80Updated 2 years ago
- ☆12Updated last year
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆33Updated 5 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆16Updated 10 months ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆56Updated 3 years ago
- ☆22Updated 5 years ago
- binary ninja related code☆25Updated 2 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago