zt-chen / voltpillager
☆31Updated 4 years ago
Alternatives and similar repositories for voltpillager:
Users that are interested in voltpillager are comparing it to the libraries listed below
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆19Updated 6 months ago
- A tool to perform so called BGE attack☆24Updated last year
- PoC for PixieFail vulnerabilities☆22Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- ☆72Updated last year
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆33Updated 4 months ago
- Research tools developed for Intel Wi-Fi chips☆52Updated last year
- A Rowhammer fuzzer for AMD Zen-based systems (USENIX Security '24).☆51Updated last month
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- [CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU☆55Updated 5 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- ☆23Updated 2 years ago
- iTLB multihit PoC☆40Updated last year
- The public release of LeftoverLocals code☆65Updated last year
- ☆125Updated last month
- Helper plugin for analyzing UEFI firmware☆90Updated 10 months ago
- A hacky tool for analysing linux kernel commits☆36Updated 2 years ago
- ☆27Updated 3 years ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆20Updated last month
- ☆10Updated 7 years ago
- ☆31Updated last week
- File permission and SIP misbehaviour hunter☆13Updated 2 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated 3 months ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- ☆21Updated 3 years ago