xoreaxeaxeax / sinkhole
Architectural privilege escalation on x86
☆853Updated 7 years ago
Alternatives and similar repositories for sinkhole:
Users that are interested in sinkhole are comparing it to the libraries listed below
- An exploration of code homeomorphism☆373Updated 7 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆675Updated 2 years ago
- The dissection of a simple "hello world" ELF binary.☆461Updated 4 years ago
- Computing with traps☆1,284Updated 11 years ago
- An optimizing decompiler☆718Updated 3 years ago
- Psychological warfare in reverse engineering☆996Updated 4 years ago
- Deprecated Binary Ninja prototype written in Python☆522Updated 4 years ago
- A linux-based assembly REPL for x86, amd64, armv7, and armv8☆1,188Updated last year
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,416Updated 5 years ago
- SimpleVisor is a simple, portable, Intel VT-x hypervisor with two specific goals: using the least amount of assembly code (10 lines), and…☆1,781Updated 10 months ago
- Sandboxed Execution Environment☆819Updated 4 years ago
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- A libre cross-platform disassembler.☆1,439Updated 6 years ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆587Updated 4 years ago
- Hardware backdoors in some x86 CPUs☆2,359Updated 6 years ago
- The Witchcraft Compiler Collection☆1,872Updated 2 months ago
- A work-in-progress deobfuscator for movfuscated binaries☆714Updated last year
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,583Updated last year
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,052Updated 3 years ago
- Survey of program analysis research with a focus on machine code☆562Updated 4 years ago
- - An Exploit Dev Swiss Army Knife.☆690Updated 3 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆508Updated 3 years ago
- We're insanely passionate about command line asm documentation in the cloud, and we're crushing it!☆374Updated 4 years ago
- The "Intel x86 considered harmful" paper☆195Updated 9 years ago
- Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API☆397Updated 4 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,880Updated 4 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆384Updated 6 years ago
- xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time | poc or gtfo☆395Updated 9 years ago
- Test DRAM for bit flips caused by the rowhammer problem☆970Updated 9 years ago
- A tool to help you write binary exploits☆609Updated 6 years ago