UT-Security / gpu-zip
☆92Updated 11 months ago
Related projects: ⓘ
- ☆111Updated last year
- ☆44Updated 3 months ago
- BTD - Bin To DNN: A DNN Executables Decompiler☆188Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆100Updated last month
- The first analysis framework for CPU microcode☆368Updated last year
- A Rowhammer fuzzer for AMD Zen-based systems (USENIX Security '24).☆41Updated 2 months ago
- XZ backdoor reverse engineering☆90Updated last month
- ☆128Updated last year
- ☆320Updated last year
- Let's find nice patterns of MD5!!☆31Updated 5 months ago
- The public release of LeftoverLocals code☆62Updated 8 months ago
- ☆411Updated last week
- Spectre based on Linear Address Masking☆62Updated 9 months ago
- GIF displaying its own MD5 (hashquine)☆75Updated 4 years ago
- simple type recognition in decompiled executables☆96Updated 2 months ago
- A library to assist writing memory-unsafe code in "pure" python, without any imports (i.e. no ctypes etc.)☆213Updated 4 months ago
- An experimental AOT compiler that translates Linux ELF binary to WebAssembly☆157Updated this week
- python to tax form compiler☆11Updated 2 years ago
- ☆77Updated 3 years ago
- ☆109Updated last year
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆138Updated 3 years ago
- Playing NES ROMs with Ghidra's PCode Emulator☆98Updated last year
- CVE-2022-32947 walkthough and demo☆152Updated last year
- PoC for PixieFail vulnerabilities☆19Updated 8 months ago
- Intel Management Engine JTAG Proof of Concept☆138Updated 4 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆29Updated 7 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆150Updated 7 months ago
- Proof-of-concept for Spook.js☆69Updated 3 years ago
- ☆440Updated 2 years ago