Battelle / sandsifterLinks
The x86 processor fuzzer
☆509Updated 6 years ago
Alternatives and similar repositories for sandsifter
Users that are interested in sandsifter are comparing it to the libraries listed below
Sorting:
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆342Updated 6 years ago
- An exploration of code homeomorphism☆378Updated 7 years ago
- Exploration of x86-64 ISA using speculative execution.☆312Updated 4 years ago
- A fast, parallel test case minimization tool.☆962Updated 4 years ago
- A differential fuzzer for x86 decoders☆250Updated 8 months ago
- GLM uCode dumps☆289Updated 5 years ago
- Computing with traps☆1,296Updated 12 years ago
- Intel Management Engine JTAG Proof of Concept☆520Updated 5 years ago
- ☆363Updated last year
- Brainfuck interpreter inside printf☆670Updated 4 years ago
- A research kernel and hypervisor attempting to get fully deterministic emulation with minimum performance cost☆526Updated 4 years ago
- RIDL test suite and exploits☆356Updated 5 years ago
- Psychological warfare in reverse engineering☆1,008Updated 5 years ago
- Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs☆318Updated 3 years ago
- Public repository for Cantordust Ghidra plugin.☆382Updated last year
- Understand and mitigate software-observable side-channels☆500Updated 4 years ago
- Interactive Redundant Assembler (shell)☆96Updated 5 years ago
- The single instruction C compiler☆1,436Updated 2 years ago
- The first analysis framework for CPU microcode☆394Updated 2 years ago
- ☆470Updated 7 months ago
- Proof of concept code for the Spectre CPU exploit.☆305Updated 2 years ago
- A work-in-progress deobfuscator for movfuscated binaries☆730Updated 2 months ago
- HTML representation of the Intel x86 instructions documentation.☆502Updated 10 years ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆378Updated 11 months ago
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- ☆450Updated 2 years ago
- unfork(2) is the inverse of fork(2). sort of.☆1,478Updated last year
- High-performance QEMU memory and instruction tracing☆542Updated 11 months ago
- bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, des…☆970Updated 3 months ago
- Visual reverse engineering tool.☆278Updated 8 years ago