luvletter2333 / xz-backdoor-analysisLinks
☆24Updated last year
Alternatives and similar repositories for xz-backdoor-analysis
Users that are interested in xz-backdoor-analysis are comparing it to the libraries listed below
Sorting:
- XZ backdoor reverse engineering☆98Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- ☆35Updated last year
- Documentation about the xz backdoor created by #xz-backdoor-reversing☆61Updated last year
- Modify a message to have a desired CRC signature.☆124Updated 3 years ago
- ☆19Updated last year
- ☆27Updated 2 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆71Updated last year
- Minimal setup to trigger the xz backdoor☆28Updated 10 months ago
- ☆46Updated 2 months ago
- ☆47Updated last month
- ☆112Updated 2 years ago
- ☆10Updated last year
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 4 months ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆201Updated 2 years ago
- yxd - Yuu's heX Dumper☆90Updated last year
- playing with DDR DRAM bus fault injection☆92Updated 10 months ago
- Documentation about the reversed engineered PSP interfaces/hardware components.☆28Updated 3 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- ☆113Updated last year
- Intel Management Engine JTAG Proof of Concept☆143Updated 5 years ago
- Simple decompiler for Rizin. It's capable of generating readable pseudo code even on handmade assembly.☆61Updated 4 months ago
- ☆70Updated 2 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆142Updated 4 years ago
- A tool to help you understand TPM commands and responses.☆46Updated 8 months ago
- ☆12Updated 2 years ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆55Updated 2 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆163Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆116Updated last year