☆187Jan 20, 2021Updated 5 years ago
Alternatives and similar repositories for plundervolt
Users that are interested in plundervolt are comparing it to the libraries listed below
Sorting:
- A practical attack framework for precise enclave execution control☆471Jan 16, 2026Updated last month
- Pong revolution.☆16Oct 26, 2025Updated 4 months ago
- Configure SPI flash write protection.☆24May 11, 2020Updated 5 years ago
- ☆17Mar 7, 2023Updated 2 years ago
- ☆33Nov 13, 2020Updated 5 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- AGL/Golang Standard Library Ed25519 including extra25519 code.☆16Jan 4, 2021Updated 5 years ago
- ☆48Dec 19, 2018Updated 7 years ago
- ☆113Jul 16, 2023Updated 2 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- CLKscrew Code and Scripts☆28May 23, 2020Updated 5 years ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Feb 25, 2023Updated 3 years ago
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated last year
- A Basic BBI Tool - So Simple, But So Good!☆32Dec 13, 2021Updated 4 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Sep 21, 2022Updated 3 years ago
- ☆26Feb 7, 2026Updated 3 weeks ago
- Understand and mitigate software-observable side-channels☆506Jan 6, 2021Updated 5 years ago
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆33Feb 13, 2026Updated 2 weeks ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆121Apr 12, 2022Updated 3 years ago
- Entity Attestation Token IETF Draft Standard☆20Apr 15, 2025Updated 10 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Jan 23, 2024Updated 2 years ago
- Supplemental material to our paper: "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"☆95Sep 5, 2022Updated 3 years ago
- ☆77Jun 14, 2018Updated 7 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- TRRespass☆127May 5, 2021Updated 4 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Proof-of-concept for the ZombieLoad attack☆828Dec 24, 2021Updated 4 years ago
- A list of system papers using/about Intel SGX☆543Jul 8, 2024Updated last year
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Jul 10, 2021Updated 4 years ago
- Website and PoC collection for transient execution attacks☆203Mar 9, 2024Updated last year
- The code to the SGX-ROP paper☆185Apr 4, 2020Updated 5 years ago
- ☆453Sep 12, 2022Updated 3 years ago
- SGX command-line tools and paper☆148Aug 4, 2016Updated 9 years ago
- ☆96Jun 18, 2024Updated last year
- The draft leading up to RFC8610☆22Jul 6, 2019Updated 6 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- ☆153Oct 18, 2018Updated 7 years ago
- The first analysis framework for CPU microcode☆412Mar 13, 2023Updated 2 years ago