trailofbits / LeftoverLocalsReleaseLinks
The public release of LeftoverLocals code
☆72Updated 2 weeks ago
Alternatives and similar repositories for LeftoverLocalsRelease
Users that are interested in LeftoverLocalsRelease are comparing it to the libraries listed below
Sorting:
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 8 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Updated last year
- iTLB multihit PoC☆42Updated 2 years ago
- Spectre based on Linear Address Masking☆68Updated 2 years ago
- ☆23Updated 3 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆52Updated last year
- ☆35Updated last year
- ☆75Updated last year
- Uncovering Container Confusion in the Linux Kernel☆46Updated last year
- ☆48Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 6 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- CTADL is a static taint analysis tool☆51Updated 5 months ago
- Vulnerabilities advisories and PoC☆18Updated 2 months ago
- ☆79Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- CTF Challenge for CSAW Finals 2021☆13Updated 4 years ago
- Proof-of-concept for the GhostWrite CPU bug.☆118Updated last year
- TrustZone Trusted Application 0-Days by Design☆25Updated 8 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆73Updated 9 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Updated last year
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated last week
- A tool to perform so called BGE attack☆26Updated 7 months ago
- ☆59Updated 3 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆37Updated 6 years ago
- Slides about HyperDbg☆40Updated 6 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆51Updated last year