Battelle / sandsifterLinks
The x86 processor fuzzer
☆513Updated 6 years ago
Alternatives and similar repositories for sandsifter
Users that are interested in sandsifter are comparing it to the libraries listed below
Sorting:
- Exploration of x86-64 ISA using speculative execution.☆315Updated 4 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆347Updated 6 years ago
- An exploration of code homeomorphism☆382Updated 7 years ago
- Computing with traps☆1,301Updated 12 years ago
- A research kernel and hypervisor attempting to get fully deterministic emulation with minimum performance cost☆535Updated 4 years ago
- GLM uCode dumps☆290Updated 5 years ago
- Public repository for Cantordust Ghidra plugin.☆388Updated last year
- Intel Management Engine JTAG Proof of Concept☆523Updated 5 years ago
- ☆365Updated last year
- A differential fuzzer for x86 decoders☆251Updated 10 months ago
- Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs☆320Updated 3 years ago
- Understand and mitigate software-observable side-channels☆502Updated 4 years ago
- The first analysis framework for CPU microcode☆398Updated 2 years ago
- A fast, parallel test case minimization tool.☆972Updated 4 years ago
- Psychological warfare in reverse engineering☆1,011Updated 5 years ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- Pure Rust x86_64 bootloader and kernel☆503Updated last year
- Brainfuck interpreter inside printf☆674Updated 4 years ago
- Proof of concept code for the Spectre CPU exploit.☆307Updated 2 years ago
- Interactive Redundant Assembler (shell)☆97Updated 5 years ago
- RIDL test suite and exploits☆357Updated 5 years ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆380Updated last year
- unfork(2) is the inverse of fork(2). sort of.☆1,477Updated last year
- A collection of programs that access and manipulate ELF files.☆611Updated 10 months ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- High-performance QEMU memory and instruction tracing☆541Updated last year
- Unlinks a binary executable to get back a set of .o object files for further transformation and re-linking.☆161Updated 3 years ago
- The single instruction C compiler☆1,456Updated 3 years ago
- A "living" Linux process with no memory☆344Updated 5 years ago
- Recognize cpu instructions in an arbitrary binary file☆704Updated last year