☆453Sep 12, 2022Updated 3 years ago
Alternatives and similar repositories for hertzbleed
Users that are interested in hertzbleed are comparing it to the libraries listed below
Sorting:
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆14Jul 21, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Jan 23, 2024Updated 2 years ago
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆32Jul 2, 2025Updated 8 months ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆22Oct 18, 2024Updated last year
- ☆1,506Jul 22, 2022Updated 3 years ago
- ☆113Jul 16, 2023Updated 2 years ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆248Jan 27, 2024Updated 2 years ago
- A practical attack framework for precise enclave execution control☆471Jan 16, 2026Updated last month
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆38Sep 6, 2022Updated 3 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Jul 10, 2021Updated 4 years ago
- ☆25Aug 9, 2023Updated 2 years ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆121Apr 12, 2022Updated 3 years ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆60Feb 20, 2026Updated last week
- The first analysis framework for CPU microcode☆412Mar 13, 2023Updated 2 years ago
- ☆20Mar 10, 2022Updated 3 years ago
- ☆119Nov 14, 2022Updated 3 years ago
- Revizor - Hardware fuzzing for the age of speculation☆179Feb 23, 2026Updated last week
- Collections of patterns for weggli to find nice bugs☆21Nov 30, 2023Updated 2 years ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Research tools developed for Intel Wi-Fi chips☆57Jun 14, 2025Updated 8 months ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- ☆37May 5, 2021Updated 4 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Aug 7, 2022Updated 3 years ago
- ☆27Nov 30, 2024Updated last year
- ☆187Jan 20, 2021Updated 5 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated 3 weeks ago
- Clockwork: A Modular Arithmetic library for C++☆12Nov 18, 2025Updated 3 months ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆43Feb 15, 2024Updated 2 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Jun 26, 2020Updated 5 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆23Jul 17, 2020Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Sep 4, 2022Updated 3 years ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆271Jun 21, 2024Updated last year
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Nov 3, 2025Updated 4 months ago