mitre-cyber-academy / 2022-ectf-insecure-exampleLinks
Insecure reference example for the 2022 Collegiate eCTF
☆13Updated 3 years ago
Alternatives and similar repositories for 2022-ectf-insecure-example
Users that are interested in 2022-ectf-insecure-example are comparing it to the libraries listed below
Sorting:
- ☆76Updated last year
- A fuzzing framework for Hexagon baseband firmware using QEMU system emulation.☆125Updated 2 months ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆34Updated last month
- Materials from the DEF CON 30 talk on PACMAN☆34Updated 3 years ago
- The public release of LeftoverLocals code☆70Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆126Updated last year
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Updated last month
- ☆68Updated 7 months ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆132Updated last year
- ☆187Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- Ledger Donjon CTF 2020☆17Updated 4 years ago
- ☆48Updated 3 years ago
- NDSS 2020 - HYPER-CUBE: High-Dimensional Hypervisor Fuzzing☆65Updated 2 years ago
- Binary exploitation by confusing the unwinder☆67Updated 2 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆71Updated 2 years ago
- ☆61Updated 5 months ago
- Linux Kernel Fuzzer Corpus☆154Updated this week
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated 8 months ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆61Updated 8 years ago
- Spectre based on Linear Address Masking☆67Updated 2 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 7 months ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆103Updated 10 months ago
- GoTEE - example application☆16Updated 3 months ago
- Microarchitectural exploitation and other hardware attacks.☆95Updated last year
- Fuzzing Embedded Systems using Hardware Breakpoints☆190Updated 2 years ago
- Simple rust fuzzer☆23Updated 4 years ago