quarkslab / pixiefailLinks
PoC for PixieFail vulnerabilities
☆23Updated last year
Alternatives and similar repositories for pixiefail
Users that are interested in pixiefail are comparing it to the libraries listed below
Sorting:
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆18Updated 5 months ago
- Spectre based on Linear Address Masking☆69Updated last year
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 7 months ago
- ☆22Updated 3 years ago
- TrustZone Trusted Application 0-Days by Design☆22Updated 2 months ago
- ☆74Updated last year
- ☆31Updated 4 years ago
- iTLB multihit PoC☆41Updated last year
- A tool to perform so called BGE attack☆24Updated last month
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- Kernel Read Write Execute☆43Updated 6 months ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆15Updated 2 months ago
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- A curated collection of scripts for kernel-related devops☆13Updated last year
- Exploit POC for CVE-2024-36877☆46Updated 11 months ago
- PoC code and tools for Black Hat USA 2024☆21Updated 11 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- Linux rootkit for educational purposes☆32Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Proof of concept code for CVE-2023-2008☆41Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last month
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆47Updated last month
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- ☆27Updated 5 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 7 months ago
- Proof-of-concept for the GhostWrite CPU bug.☆115Updated 11 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- ☆37Updated 2 years ago
- ☆11Updated 3 years ago
- Materials for my DMA attacks talk and a collection of related links☆53Updated last year