turbo / KPTI-PoC-Collection
Meltdown/Spectre PoC src collection.
☆507Updated 7 years ago
Alternatives and similar repositories for KPTI-PoC-Collection
Users that are interested in KPTI-PoC-Collection are comparing it to the libraries listed below
Sorting:
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- Some kernel fuzzing paper about windows and linux☆254Updated 7 years ago
- Meltdown/Spectre experiments☆53Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Updated 6 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- ☆87Updated 8 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- android kernel pwn☆19Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- POC and exploitation of vulnerabilities☆90Updated 3 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 7 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 6 years ago
- Fuzz testing on JavaScriptCore and WebAssembly in WebKit☆6Updated 5 years ago
- A function tracer☆90Updated 5 years ago
- Windows builds for use with angr framework☆29Updated 9 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆181Updated 7 years ago
- ARM Shellcode Generator☆104Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆83Updated 6 years ago
- ☆41Updated 7 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Updated 3 years ago
- x64dbg plugin to check security settings☆129Updated 8 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Updated 7 years ago
- Making GO reversing easier in IDA Pro☆17Updated 5 years ago
- vm escape exploit☆39Updated 7 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 9 years ago
- ☆51Updated 7 years ago