trailofbits / LeftoverLocalsReleaseLinks
The public release of LeftoverLocals code
☆70Updated last year
Alternatives and similar repositories for LeftoverLocalsRelease
Users that are interested in LeftoverLocalsRelease are comparing it to the libraries listed below
Sorting:
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆52Updated 5 months ago
- iTLB multihit PoC☆42Updated last year
- ☆23Updated 2 years ago
- CTF Challenge for CSAW Finals 2021☆12Updated 3 years ago
- ☆33Updated 8 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 5 months ago
- TrustZone Trusted Application 0-Days by Design☆24Updated 5 months ago
- ☆48Updated 2 years ago
- ☆75Updated last year
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆20Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆115Updated last year
- Binary-only fuzzer for WebAssembly (WASI)☆51Updated last year
- ☆58Updated 3 months ago
- Spectre based on Linear Address Masking☆67Updated last year
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆63Updated last year
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated 11 months ago
- A tool to perform so called BGE attack☆25Updated 4 months ago
- ☆79Updated last year
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆17Updated 11 months ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated 6 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆56Updated 2 weeks ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆19Updated 11 months ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Minimal setup to trigger the xz backdoor☆28Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- BINARLY Research Tools and PoCs☆38Updated last year