☆13Apr 27, 2020Updated 5 years ago
Alternatives and similar repositories for pitchfork-angr
Users that are interested in pitchfork-angr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- A toy C Compiler implemented by Rust.☆19Feb 4, 2023Updated 3 years ago
- A Redex tutorial with a focus on how to do work in Redex☆11Oct 21, 2024Updated last year
- Working Set Page Cache side-channel IPC PoC☆67Jan 9, 2019Updated 7 years ago
- BTB-X HPCA23 code☆13Jan 6, 2023Updated 3 years ago
- A Rust style C++ library.☆19Sep 3, 2022Updated 3 years ago
- A tool collection of various attacks on TLS based on TLS-Attacker☆23Jun 25, 2025Updated 8 months ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- ☆20Nov 4, 2020Updated 5 years ago
- Writeup that goes along with this:☆16Apr 19, 2018Updated 7 years ago
- a compiler from a lambda language to an assembly language, as a rewrite system☆16Sep 23, 2025Updated 5 months ago
- Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux☆15Oct 22, 2021Updated 4 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- ☆14Sep 25, 2013Updated 12 years ago
- A tool for auditing Rust crates☆34Feb 10, 2026Updated last month
- The Gtgraph library from Georgia Tech.☆19Mar 30, 2023Updated 2 years ago
- Implementing the Precise Runahead (HPCA'20) in gem5☆14Oct 5, 2023Updated 2 years ago
- small and independent checkpoint☆12Nov 4, 2023Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- A Man in the Middle proof of concept using docker containers☆21Jul 11, 2021Updated 4 years ago
- A Scribble library for typesetting grammars better☆15Feb 22, 2023Updated 3 years ago
- generating DFG and CFG from source code (using LLVM ) or from binary (using LLVM and Mcsema) 二进制或者源码转CGF& DFG☆42Sep 16, 2019Updated 6 years ago
- Sci Blog jekyll theme☆16Dec 17, 2022Updated 3 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆63Aug 7, 2022Updated 3 years ago
- CleanupSpec (MICRO-2019)☆16Oct 22, 2020Updated 5 years ago
- A clone of DrRacket-style Unicode symbol input for Emacs☆16Aug 10, 2022Updated 3 years ago
- ☆11Aug 28, 2024Updated last year
- Implementation of Log20 in Java☆12Aug 15, 2018Updated 7 years ago
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone.☆32May 23, 2024Updated last year
- Linux source code for ISCA 2020 paper "Enhancing and Exploiting Contiguity for Fast Memory Virtualization"☆20Oct 31, 2020Updated 5 years ago
- Public-facing course info for program analysis materials.☆43Dec 4, 2025Updated 3 months ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Jun 26, 2020Updated 5 years ago
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- ☆15Oct 21, 2020Updated 5 years ago
- LFSC Proof Checker☆11Sep 14, 2023Updated 2 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year