quarkslab / pixiefailLinks
PoC for PixieFail vulnerabilities
☆23Updated last year
Alternatives and similar repositories for pixiefail
Users that are interested in pixiefail are comparing it to the libraries listed below
Sorting:
- TrustZone Trusted Application 0-Days by Design☆22Updated last month
- Spectre based on Linear Address Masking☆69Updated last year
- Exploit POC for CVE-2024-36877☆46Updated 10 months ago
- ☆21Updated 3 years ago
- ☆74Updated last year
- ☆16Updated 9 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 6 months ago
- Linux rootkit for educational purposes☆31Updated last year
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆34Updated 7 months ago
- iTLB multihit PoC☆41Updated last year
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆17Updated 4 months ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated last year
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation☆21Updated 3 months ago
- A tool to perform so called BGE attack☆24Updated 2 weeks ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Kernel Read Write Execute☆43Updated 5 months ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- ☆43Updated 2 months ago
- ☆26Updated 4 months ago
- Materials for my DMA attacks talk and a collection of related links☆53Updated last year
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆10Updated 2 years ago
- weggli ruleset scanner for source code and binaries☆29Updated last month
- Python interface for Binexport, the Bindiff export format☆17Updated 2 weeks ago
- ☆31Updated 4 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆47Updated last month
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago