nccgroup / rustproofing-linux
☆23Updated 2 years ago
Alternatives and similar repositories for rustproofing-linux:
Users that are interested in rustproofing-linux are comparing it to the libraries listed below
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆46Updated last month
- Uncovering Container Confusion in the Linux Kernel☆43Updated 10 months ago
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆31Updated last year
- iTLB multihit PoC☆40Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆57Updated last year
- Linux kernel branches for confidential compute research☆17Updated 2 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆43Updated 6 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆33Updated last month
- Harness for the Linux kernel eBPF verifier☆32Updated 2 years ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆21Updated 9 months ago
- ☆82Updated 4 months ago
- An automated setup for fuzzing Redis w/ AFL++☆33Updated 2 years ago
- The public release of LeftoverLocals code☆65Updated last year
- Research tools developed for Intel Wi-Fi chips☆50Updated last year
- Spectre based on Linear Address Masking☆68Updated last year
- io_uring based network scanner written in Rust☆44Updated last year
- ☆18Updated 3 years ago
- ☆14Updated 4 months ago
- Explore a live Linux kernel's memory using GDB☆113Updated 2 years ago
- A system call interception tool☆54Updated last month
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆10Updated last week
- Fuzz Rust code with LibAFL☆58Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆105Updated 5 months ago
- ☆85Updated 6 months ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆19Updated last year
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆16Updated 6 months ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆20Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- A hacky tool for analysing linux kernel commits☆37Updated last year
- Binary-only fuzzer for WebAssembly (WASI)☆48Updated 5 months ago