xoreaxeaxeax / sinkholeLinks
Architectural privilege escalation on x86
☆856Updated 7 years ago
Alternatives and similar repositories for sinkhole
Users that are interested in sinkhole are comparing it to the libraries listed below
Sorting:
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆695Updated 3 years ago
- An exploration of code homeomorphism☆379Updated 7 years ago
- Computing with traps☆1,309Updated 12 years ago
- Psychological warfare in reverse engineering☆1,027Updated 5 years ago
- An optimizing decompiler☆760Updated 4 years ago
- The Witchcraft Compiler Collection☆1,974Updated 2 months ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆520Updated 6 months ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,601Updated 6 months ago
- The dissection of a simple "hello world" ELF binary.☆465Updated 5 years ago
- A libre cross-platform disassembler.☆1,441Updated 6 years ago
- Deprecated Binary Ninja prototype written in Python☆523Updated 5 years ago
- An open source interactive disassembler☆1,079Updated 6 years ago
- A linux-based assembly REPL for x86, amd64, armv7, and armv8☆1,243Updated last year
- A work-in-progress deobfuscator for movfuscated binaries☆749Updated 7 months ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,061Updated 4 years ago
- The "Intel x86 considered harmful" paper☆200Updated 9 years ago
- This project has been moved to:☆1,461Updated 4 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆591Updated 4 years ago
- Hardware backdoors in some x86 CPUs☆2,380Updated 7 years ago
- A machine emulator that visualizes how each instruction is processed☆389Updated 8 years ago
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- We're insanely passionate about command line asm documentation in the cloud, and we're crushing it!☆381Updated 5 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆285Updated 3 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago
- Survey of program analysis research with a focus on machine code☆566Updated 5 years ago
- Modern Memory Safety in C/C++☆1,217Updated 9 years ago
- Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API☆411Updated 5 years ago
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,441Updated 6 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆310Updated 4 years ago