yikesoftware / qemu-8.2.2-cetView external linksLinks
Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc code. The project is currently applicable to ELF emulation in user mode on x86_64 architecture.
☆14Jun 5, 2024Updated last year
Alternatives and similar repositories for qemu-8.2.2-cet
Users that are interested in qemu-8.2.2-cet are comparing it to the libraries listed below
Sorting:
- An automated ROP generation work☆12Mar 5, 2025Updated 11 months ago
- 国科大软件安全原理作业☆25Oct 27, 2020Updated 5 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- ☆25Nov 8, 2023Updated 2 years ago
- Right click -> "Open with IDA"☆27Jan 20, 2024Updated 2 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- 一个中文版本的 LibAFL 笔记,主要内容是 LibAFL 原理相关的内容,同时也附加一些 LibAFL 使用方面的 tips ,方便查阅和参考。☆35Nov 22, 2023Updated 2 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- ☆13Apr 21, 2024Updated last year
- ☆34Mar 20, 2024Updated last year
- 使用intel pin来求解一部分CTF challenge☆32Jul 1, 2018Updated 7 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Enable the bridge and br-netfilter modules on WSL2. This allows you to use "bridge" network mode for Hashicorp Nomad jobs. I believe it a…☆11Jan 6, 2024Updated 2 years ago
- 四川大学体育题库助手☆15Jun 1, 2022Updated 3 years ago
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- ☆10Nov 29, 2016Updated 9 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- ☆12Apr 1, 2025Updated 10 months ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 3 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- ☆21Feb 2, 2026Updated 2 weeks ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- CVE-2021-22205 RCE☆13Jul 4, 2022Updated 3 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- cross platform asynchronous networking library☆10Apr 1, 2020Updated 5 years ago