mitre-cyber-academy / 2022-ectf-insecure-example
Insecure reference example for the 2022 Collegiate eCTF
☆13Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for 2022-ectf-insecure-example
- CTF writeups☆42Updated 2 years ago
- Revizor - a fuzzer to search for microarchitectural leaks in CPUs☆114Updated 3 weeks ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆35Updated 3 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆57Updated 7 years ago
- ☆15Updated 3 years ago
- ☆57Updated 6 months ago
- ☆113Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆104Updated last year
- A flush-reload side channel attack implementation☆42Updated 2 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆34Updated 2 years ago
- autofz: Automated Fuzzer Composition at Runtime☆76Updated last year
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆58Updated 7 years ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆116Updated 5 months ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated last year
- ☆81Updated 2 months ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆60Updated 2 years ago
- NDSS 2020 - HYPER-CUBE: High-Dimensional Hypervisor Fuzzing☆60Updated last year
- Platypus Educational Samples☆16Updated 3 years ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆53Updated 2 years ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆52Updated last month
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆79Updated 3 weeks ago
- A tool for automating setup of kernel pwn challenges☆49Updated last week
- ☆22Updated 5 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆20Updated 4 years ago
- ☆65Updated 8 months ago
- SageMath/Python Toolkit for Cryptanalytic Research☆38Updated 2 years ago
- Recent security papers on firmware analysis☆75Updated 3 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆164Updated 6 months ago
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆277Updated last week