luvletter2333 / xz-backdoor-analysisLinks
☆24Updated last year
Alternatives and similar repositories for xz-backdoor-analysis
Users that are interested in xz-backdoor-analysis are comparing it to the libraries listed below
Sorting:
- XZ backdoor reverse engineering☆98Updated last year
- ☆45Updated 2 months ago
- ☆35Updated last year
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆59Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- Minimal setup to trigger the xz backdoor☆28Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆73Updated last year
- ☆27Updated 2 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆203Updated 3 years ago
- ☆112Updated 2 years ago
- A Dissect module implementing a parser for C-like structures.☆55Updated last week
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 7 months ago
- ☆52Updated 4 months ago
- ☆116Updated 2 years ago
- ☆70Updated 2 years ago
- Utility to find hidden Linux kernel modules☆147Updated 4 months ago
- ☆11Updated 2 years ago
- CVE-2022-32947 walkthough and demo☆187Updated 2 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- playing with DDR DRAM bus fault injection☆92Updated last year
- LKRG bypass methods☆73Updated 5 years ago
- A radare2 Python script to dump a raw IA32 binary to an NASM source file☆32Updated 6 months ago
- Usage of enabled-by-default hardening-related compiler flags across Linux distributions☆60Updated 9 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆171Updated last year
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- yxd - Yuu's heX Dumper☆90Updated last year
- Simple decompiler for Rizin. It's capable of generating readable pseudo code even on handmade assembly.☆61Updated 7 months ago
- Information about Linux system calls on different architectures☆168Updated last month