quarkslab / pixiefail
PoC for PixieFail vulnerabilities
☆22Updated last year
Alternatives and similar repositories for pixiefail:
Users that are interested in pixiefail are comparing it to the libraries listed below
- A tool to perform so called BGE attack☆24Updated last year
- ☆21Updated 3 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆16Updated 2 months ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆33Updated 4 months ago
- Materials for my DMA attacks talk and a collection of related links☆47Updated 10 months ago
- ☆72Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 4 months ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Spectre based on Linear Address Masking☆68Updated last year
- Exploit POC for CVE-2024-36877☆46Updated 8 months ago
- ☆31Updated 4 years ago
- Kernel Read Write Execute☆41Updated 3 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated 3 months ago
- PoC code and tools for Black Hat USA 2024☆21Updated 8 months ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Code snippets for Binary Ninja's Python API☆27Updated 3 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆81Updated 2 years ago
- Research tools developed for Intel Wi-Fi chips☆52Updated last year
- RISC-V ISA processor module for IDAPro 7.x☆31Updated 4 years ago
- Pickle decompiler plugin for Radare2☆18Updated last year
- ☆25Updated 2 months ago
- A repository with UEFI research stuff☆14Updated last year
- ☆30Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- ☆16Updated 7 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆52Updated 2 weeks ago
- Proof-of-concept for the GhostWrite CPU bug.☆110Updated 8 months ago
- ☆23Updated 2 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago