mitre-cyber-academy / 2022-ectf-insecure-exampleLinks
Insecure reference example for the 2022 Collegiate eCTF
☆13Updated 3 years ago
Alternatives and similar repositories for 2022-ectf-insecure-example
Users that are interested in 2022-ectf-insecure-example are comparing it to the libraries listed below
Sorting:
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆33Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- ☆26Updated last year
- Microarchitectural exploitation and other hardware attacks.☆93Updated last year
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆74Updated 2 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆59Updated 2 years ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆117Updated 3 years ago
- ☆74Updated last year
- ☆112Updated 2 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆153Updated last year
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆43Updated 2 years ago
- Materials from the DEF CON 30 talk on PACMAN☆33Updated 2 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆61Updated 3 years ago
- The public release of LeftoverLocals code☆67Updated last year
- ☆182Updated last year
- PoC of fuzzing closed-source userspace binaries with KVM☆166Updated last year
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆54Updated 4 months ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆84Updated last month
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆78Updated 8 months ago
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Updated 4 months ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆32Updated last year
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆74Updated last month
- GraphFuzz is an experimental framework for building structure-aware, library API fuzzers.☆267Updated last year
- CSAW Embedded Security Challenge 2020☆27Updated 4 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- Revizor - a fuzzer to search for microarchitectural leaks in CPUs☆159Updated last week
- Tool to Analyze Speculative Execution Attacks and Mitigations☆55Updated 3 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year