Battelle / sandsifterLinks
The x86 processor fuzzer
☆515Updated 7 years ago
Alternatives and similar repositories for sandsifter
Users that are interested in sandsifter are comparing it to the libraries listed below
Sorting:
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆347Updated 7 years ago
- Exploration of x86-64 ISA using speculative execution.☆316Updated 4 years ago
- Computing with traps☆1,303Updated 12 years ago
- A research kernel and hypervisor attempting to get fully deterministic emulation with minimum performance cost☆537Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆526Updated 5 years ago
- A fast, parallel test case minimization tool.☆972Updated 4 years ago
- An exploration of code homeomorphism☆378Updated 7 years ago
- A differential fuzzer for x86 decoders☆251Updated last year
- Understand and mitigate software-observable side-channels☆505Updated 4 years ago
- GLM uCode dumps☆290Updated 5 years ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- RIDL test suite and exploits☆357Updated 5 years ago
- ☆365Updated last year
- Public repository for Cantordust Ghidra plugin.☆390Updated last year
- Interactive Redundant Assembler (shell)☆95Updated 5 years ago
- Brainfuck interpreter inside printf☆676Updated 4 years ago
- ☆470Updated 11 months ago
- Proof of concept code for the Spectre CPU exploit.☆307Updated 2 years ago
- Psychological warfare in reverse engineering☆1,015Updated 5 years ago
- Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs☆320Updated 3 years ago
- Display, extract, and manipulate PSP firmware inside UEFI images☆658Updated last week
- The single instruction C compiler☆1,460Updated 3 years ago
- High-performance QEMU memory and instruction tracing☆544Updated last year
- The first analysis framework for CPU microcode☆401Updated 2 years ago
- Pure Rust x86_64 bootloader and kernel☆502Updated last year
- revng: the core repository of the rev.ng project☆1,564Updated this week
- Recognize cpu instructions in an arbitrary binary file☆706Updated last year
- Unlinks a binary executable to get back a set of .o object files for further transformation and re-linking.☆161Updated 3 years ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆382Updated last year
- unfork(2) is the inverse of fork(2). sort of.☆1,477Updated last year