luvletter2333 / xz-backdoor-analysisLinks
☆24Updated last year
Alternatives and similar repositories for xz-backdoor-analysis
Users that are interested in xz-backdoor-analysis are comparing it to the libraries listed below
Sorting:
- XZ backdoor reverse engineering☆98Updated last year
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- Minimal setup to trigger the xz backdoor☆28Updated last year
- ☆35Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- ☆27Updated 2 years ago
- ☆112Updated 2 years ago
- ☆70Updated 2 years ago
- Modify a message to have a desired CRC signature.☆124Updated 4 years ago
- ☆11Updated 2 years ago
- GitHub Pages for Kernel Self Protection Project☆19Updated 3 weeks ago
- ☆45Updated last month
- ☆20Updated last year
- playing with DDR DRAM bus fault injection☆92Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆113Updated 2 years ago
- ☆114Updated 2 years ago
- PoC for PixieFail vulnerabilities☆24Updated last year
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 6 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- yxd - Yuu's heX Dumper☆90Updated last year
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆203Updated 3 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆32Updated 2 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- decode bits into bytes☆46Updated 5 years ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆269Updated last year
- Determine which CPU architecture is used in a binary file.☆122Updated 7 months ago
- ☆50Updated 3 months ago
- Ghidra extension to disassemble NSIS installers☆23Updated last month
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago