Battelle / sandsifterLinks
The x86 processor fuzzer
☆516Updated 7 years ago
Alternatives and similar repositories for sandsifter
Users that are interested in sandsifter are comparing it to the libraries listed below
Sorting:
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆349Updated 7 years ago
- Exploration of x86-64 ISA using speculative execution.☆316Updated 4 years ago
- Computing with traps☆1,305Updated 12 years ago
- RIDL test suite and exploits☆357Updated 5 years ago
- A research kernel and hypervisor attempting to get fully deterministic emulation with minimum performance cost☆538Updated 4 years ago
- An exploration of code homeomorphism☆379Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept☆527Updated 5 years ago
- Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs☆320Updated 3 years ago
- Linux i386 tool to load and execute ME modules.☆136Updated 4 years ago
- ☆367Updated last year
- A differential fuzzer for x86 decoders☆252Updated last year
- A fast, parallel test case minimization tool.☆973Updated 4 years ago
- ☆453Updated 3 years ago
- The first analysis framework for CPU microcode☆403Updated 2 years ago
- GLM uCode dumps☆291Updated 5 years ago
- ☆471Updated 11 months ago
- Hiding messages in x86 programs using semantic duals☆308Updated last week
- Brainfuck interpreter inside printf☆676Updated 4 years ago
- The world's worst kernel module☆300Updated 4 years ago
- Understand and mitigate software-observable side-channels☆506Updated 4 years ago
- Public repository for Cantordust Ghidra plugin.☆392Updated last year
- Interactive Redundant Assembler (shell)☆95Updated 5 years ago
- Psychological warfare in reverse engineering☆1,021Updated 5 years ago
- High-performance QEMU memory and instruction tracing☆547Updated last year
- Pure Rust x86_64 bootloader and kernel☆503Updated 2 years ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆381Updated last year
- Proof of concept code for the Spectre CPU exploit.☆307Updated 2 years ago
- The single instruction C compiler☆1,467Updated 3 years ago
- Unlinks a binary executable to get back a set of .o object files for further transformation and re-linking.☆161Updated 3 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago