nwork / jellyfishLinks
GPU rootkit PoC by Team Jellyfish
☆120Updated 10 years ago
Alternatives and similar repositories for jellyfish
Users that are interested in jellyfish are comparing it to the libraries listed below
Sorting:
- Utility to find AES keys in running processes☆334Updated 2 years ago
- A "living" Linux process with no memory☆351Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆536Updated 5 years ago
- Exploration of x86-64 ISA using speculative execution.☆316Updated last month
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- ☆129Updated 3 years ago
- Linux i386 tool to load and execute ME modules.☆137Updated 4 years ago
- ☆118Updated 2 years ago
- Pillman boot sector game, a yellow thing eats pills and is chased by monsters.☆318Updated 4 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆769Updated 2 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- https://twitter.com/itsreallynick/status/1120410950430089224☆420Updated 6 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- Enable piping of internal command output to external commands☆70Updated 7 years ago
- A digital logic simulation written in C☆63Updated 5 years ago
- GLM uCode dumps☆295Updated 5 years ago
- Just a simple radare2 Jupyter kernel☆110Updated 8 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆102Updated 2 years ago
- Get Your 3D Printed High Security Key☆147Updated 4 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- Obuscated C Christmas programs☆379Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆385Updated last year
- The x86 processor fuzzer☆522Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆161Updated last year
- Etherify - bringing the ether back to ethernet☆345Updated 4 years ago
- Demo Spectre with 70 lines code☆126Updated 7 years ago
- AKA "Internet Chemotherapy"☆65Updated 8 years ago
- Hiding messages in x86 programs using semantic duals☆317Updated last week
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated last year