mitre-cyber-academy / 2022-ectf-insecure-example
Insecure reference example for the 2022 Collegiate eCTF
☆13Updated 2 years ago
Alternatives and similar repositories for 2022-ectf-insecure-example:
Users that are interested in 2022-ectf-insecure-example are comparing it to the libraries listed below
- ☆57Updated 9 months ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆150Updated last year
- Pin-Based Constant Execution Checker (Pin-based CEC)☆17Updated this week
- Files used for reproducing Fuzzware's experiments☆55Updated last year
- ☆10Updated last week
- Revizor - a fuzzer to search for microarchitectural leaks in CPUs☆121Updated 2 weeks ago
- Fuzzing Embedded Systems using Hardware Breakpoints☆182Updated last year
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆37Updated 2 years ago
- ☆160Updated 3 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆74Updated 5 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆57Updated 8 years ago
- Materials from the DEF CON 30 talk on PACMAN☆29Updated 2 years ago
- ☆50Updated 11 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆117Updated 2 months ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆31Updated 11 months ago
- Linux Kernel Fuzzer Corpus☆132Updated this week
- NDSS 2020 - HYPER-CUBE: High-Dimensional Hypervisor Fuzzing☆62Updated last year
- Website and PoC collection for transient execution attacks☆177Updated 11 months ago
- ☆70Updated 11 months ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆60Updated 3 months ago
- ☆177Updated last year
- ☆153Updated 2 months ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆57Updated 9 months ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆54Updated 3 years ago
- Tool for testing and finding minimal eviction sets☆97Updated 3 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆115Updated 4 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆60Updated 7 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆135Updated 3 years ago
- Recent security papers on firmware analysis☆75Updated 3 years ago