☆17Jun 26, 2025Updated 8 months ago
Alternatives and similar repositories for Hacky-Racer
Users that are interested in Hacky-Racer are comparing it to the libraries listed below
Sorting:
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Feb 18, 2021Updated 5 years ago
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆17Nov 25, 2025Updated 3 months ago
- Automated test generator to detectcache side channel leakages.☆11Jul 1, 2019Updated 6 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- Dump Apple PMU counter definitions from `/usr/share/kpep` in macOS☆16Jan 8, 2026Updated last month
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆19Nov 17, 2022Updated 3 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- This is the repo for remote direct memory introspection.☆23Jun 21, 2023Updated 2 years ago
- ☆48Dec 19, 2018Updated 7 years ago
- ☆25Mar 1, 2023Updated 2 years ago
- ☆30Feb 20, 2024Updated 2 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆19Jul 14, 2020Updated 5 years ago
- ☆19Jan 9, 2025Updated last year
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 9 years ago
- Proof-of-concept for the ZombieLoad and RIDL attacks☆29May 26, 2019Updated 6 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- Website and PoC collection for transient execution attacks☆202Mar 9, 2024Updated last year
- Repeated access to L2-containable loops to look for snoop filter conflicts on Intel Skylake Xeon processors.☆29Aug 17, 2018Updated 7 years ago
- ☆36Jan 21, 2021Updated 5 years ago
- Port of the LLVM compiler infrastructure to the time-predictable processor Patmos☆15Apr 2, 2025Updated 10 months ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆40Dec 14, 2022Updated 3 years ago
- ☆45Jul 19, 2023Updated 2 years ago
- Update IP on Wireguard tunnel point-to-point with both dynamic public IP addresses☆11Jun 17, 2024Updated last year
- A tool for checking the contract satisfaction for hardware designs☆12Nov 4, 2025Updated 3 months ago
- ☆12Feb 15, 2024Updated 2 years ago
- Transparent serialization of python plain-old-data classes☆12Aug 31, 2022Updated 3 years ago
- A Thesis Class for the Chair of Software Engineering II at the University of Passau, Germany☆13Jun 14, 2025Updated 8 months ago
- ☆11Aug 23, 2023Updated 2 years ago
- RISC-V 64 CPU☆10Oct 4, 2025Updated 4 months ago
- GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/☆42Sep 19, 2019Updated 6 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 3 months ago
- Slice-aware Memory Management - Exploiting NUCA Characteristic of LLC in Intel Processors☆41May 20, 2019Updated 6 years ago
- Automatic tool to quickly start a pwn CTF challenge☆45Nov 3, 2023Updated 2 years ago
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46May 19, 2023Updated 2 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆48Aug 12, 2022Updated 3 years ago
- Running ahead of memory latency - Part II project☆10Jan 7, 2023Updated 3 years ago