timingattestation / timing-attestationLinks
Automatically exported from code.google.com/p/timing-attestation
☆13Updated 10 years ago
Alternatives and similar repositories for timing-attestation
Users that are interested in timing-attestation are comparing it to the libraries listed below
Sorting:
- Interactive Virtual Machine Introspection☆18Updated 7 years ago
- Recon materials☆27Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- ☆14Updated 9 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- XED based Disassembly Engine☆20Updated 7 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Dynamic instrumentation of the Linux kernel☆40Updated 10 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- PIN tool runtracer suite☆44Updated 9 years ago
- Visualize an ELF's execution☆11Updated 10 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Linux hooking engine for ARM architecture☆16Updated 10 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- JEFF file format tools☆27Updated 9 years ago
- ☆24Updated 10 years ago
- ☆25Updated 7 years ago
- ☆15Updated 5 years ago
- In memory fuzzing for embedded devices☆19Updated 13 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 6 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Updated 11 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Updated 11 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- ☆70Updated 5 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 7 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 10 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆60Updated 8 years ago