-
Sapienza University of Rome
- https://www.diag.uniroma1.it/~delia/
- https://orcid.org/0000-0003-4358-976X
- @dcdelia
Highlights
- Pro
Stars
A little tool to play with Windows security
The Minimalistic x86/x64 API Hooking Library for Windows
UNIX-like reverse engineering framework and command-line toolset.
EasyHook - The reinvention of Windows API Hooking
Source code of a multiple series of tutorials about the hypervisor. Available at: https://rayanfam.com/tutorials
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU
AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as g…
a small C library for x86 CPU detection and feature extraction
Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging
FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.
The Windows Library for Intel Process Trace (WinIPT) is a project that leverages the new Intel Processor Trace functionality exposed by Windows 10 Redstone 5 (1809), through a set of libraries and …
VulnReproduction / LinuxFlaw
Forked from mudongliang/LinuxFlawThis repo records all the vulnerabilities of linux software I have reproduced in my local workspace
The vm images in this repo are lost, we recommend our new project: https://github.com/hust-open-atom-club/S2VulnHub
Set of Dynamic Binary Instrumentation and visualization tools for execution traces.
Intel Vt-x/EPT based thin-hypervisor for windows with minimum possible code.
This repository contains examples of Flush+Flush cache attacks
This repository contains several tools to perform Cache Template Attacks
Unlinks a binary executable to get back a set of .o object files for further transformation and re-linking.
Very low-overhead timer/counter interfaces for C on Intel 64 processors.
A branch-monitor-based solution for process monitoring.
Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins