nwork / jellyfishLinks
GPU rootkit PoC by Team Jellyfish
☆120Updated 10 years ago
Alternatives and similar repositories for jellyfish
Users that are interested in jellyfish are comparing it to the libraries listed below
Sorting:
- Utility to find AES keys in running processes☆334Updated 2 years ago
- A "living" Linux process with no memory☆351Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆535Updated 5 years ago
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 8 years ago
- Exploration of x86-64 ISA using speculative execution.☆315Updated 2 weeks ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- Linux i386 tool to load and execute ME modules.☆136Updated 4 years ago
- ☆129Updated 3 years ago
- GLM uCode dumps☆295Updated 5 years ago
- Hiding messages in x86 programs using semantic duals☆315Updated 3 weeks ago
- ☆118Updated 2 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- A research kernel and hypervisor attempting to get fully deterministic emulation with minimum performance cost☆542Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆385Updated last year
- Sandboxed, Rust-based, Windows Defender Client☆180Updated 8 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- Etherify - bringing the ether back to ethernet☆344Updated 4 years ago
- Demo Spectre with 70 lines code☆126Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept☆145Updated 5 years ago
- AKA "Internet Chemotherapy"☆65Updated 8 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- Pillman boot sector game, a yellow thing eats pills and is chased by monsters.☆318Updated 4 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆769Updated 2 years ago
- Get Your 3D Printed High Security Key☆147Updated 4 years ago
- General Research Repository - Only updated when I feel like it☆28Updated last year
- Breaks the encryption and obfuscation layers that Dropbox applies to their modified Python interpreter.☆88Updated 5 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆419Updated 6 years ago