xoreaxeaxeax / mchammerLinks
machine check exploitation
☆50Updated 3 months ago
Alternatives and similar repositories for mchammer
Users that are interested in mchammer are comparing it to the libraries listed below
Sorting:
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆34Updated last year
- ☆81Updated 6 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆171Updated last year
- ☆90Updated 9 months ago
- ☆155Updated last week
- Binary exploitation by confusing the unwinder☆66Updated 2 years ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆125Updated last month
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆37Updated 4 months ago
- Shiva is a programmable dynamic linker for loading ELF microprograms☆34Updated 2 years ago
- Binarly Vulnerability Research Advisories☆182Updated last month
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 8 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- ☆43Updated 3 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆122Updated last year
- UEFI and SMM Assessment Tool☆208Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆99Updated 6 months ago
- Windows KASLR bypass using prefetch side-channel☆164Updated last year
- Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.☆119Updated 2 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Modular and extensible library for Virtual Machine Introspection☆111Updated 3 months ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆114Updated last year
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆109Updated last year
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated 6 months ago
- IDA's Lumina feature, reimplemented for Binary Ninja, with new error handeling!☆37Updated 11 months ago
- ☆79Updated 11 months ago
- iTLB multihit PoC☆42Updated 2 years ago
- ☆94Updated last year
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆42Updated 2 years ago
- ☆62Updated 9 months ago