PoC for PixieFail vulnerabilities
☆26Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for pixiefail
Users that are interested in pixiefail are comparing it to the libraries listed below
Sorting:
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- ynetd: a small (< 400 lines of C) server for binding programs to TCP ports☆20Nov 24, 2024Updated last year
- Binary Ninja plugin to clean up some common obfuscation techniques.☆22Jun 8, 2020Updated 5 years ago
- Artifacts for "Phoenix: Rowhammer Attacks on DDR5 with Self-Correcting Synchronization" (IEEE S&P '26)☆60Sep 17, 2025Updated 5 months ago
- a mini 2x2 systolic array and PE demo☆68Dec 21, 2025Updated 2 months ago
- ☆19Nov 23, 2025Updated 3 months ago
- trustonic tbase research☆32Jan 28, 2018Updated 8 years ago
- ☆19Feb 5, 2026Updated last month
- Chess + fairy chess + atomic chess + custom rules/boards/pieces + AI☆12Mar 5, 2019Updated 7 years ago
- A CLI-based API-like tool that enables program access to perchance.org's AI Image Generator via calls to webapp's API☆10Dec 26, 2023Updated 2 years ago
- The chat back-end for destiny.gg, written in Go, based on Golem (github.com/trevex/golem)☆12May 22, 2021Updated 4 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- A tool to eliminate timing-based side channels☆50Dec 28, 2022Updated 3 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- https://github.com/wcventure/FuzzingPaper☆10Jan 15, 2022Updated 4 years ago
- Normalizing bash administration and development across different OS-es and distributions☆10Mar 25, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- A PowerShell module that uses the WIN_API to access the registry☆14Apr 13, 2017Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆15Jan 17, 2025Updated last year
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆12Nov 27, 2025Updated 3 months ago
- Unlock password encryption in PDF☆11Aug 16, 2019Updated 6 years ago
- Let Unifi Guests check voucher data bundle left☆10Nov 13, 2017Updated 8 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Apr 28, 2024Updated last year
- ☆12Jul 12, 2022Updated 3 years ago
- Dev resources of Harmony☆15Mar 4, 2024Updated 2 years ago
- Binary Ninja Plugin for RISC-V☆14Nov 29, 2023Updated 2 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 9 months ago
- NotePage is a web application that allows you to easily share code, text, or any content using a unique link.☆13Mar 23, 2024Updated last year
- ☆30Nov 25, 2025Updated 3 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago