UT-Security / gpu-zip
☆95Updated last year
Alternatives and similar repositories for gpu-zip
Users that are interested in gpu-zip are comparing it to the libraries listed below
Sorting:
- playing with DDR DRAM bus fault injection☆91Updated 7 months ago
- ☆112Updated last year
- ☆323Updated last year
- Playing NES ROMs with Ghidra's PCode Emulator☆103Updated last year
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆139Updated 3 years ago
- The first analysis framework for CPU microcode☆392Updated 2 years ago
- The public release of LeftoverLocals code☆66Updated last year
- CVE-2022-32947 walkthough and demo☆172Updated last year
- simple type recognition in decompiled executables☆109Updated 10 months ago
- Let's find nice patterns of MD5!!☆34Updated last month
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year
- ☆444Updated 2 years ago
- BTD - Bin To DNN: A DNN Executables Decompiler☆194Updated 2 years ago
- ☆128Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 4 years ago
- ☆427Updated 5 months ago
- Spectre based on Linear Address Masking☆68Updated last year
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆65Updated 5 months ago
- XZ backdoor reverse engineering☆94Updated 9 months ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated this week
- A Rowhammer fuzzer for AMD Zen-based systems (USENIX Security '24).☆52Updated last month
- Processor fuzzer targeting the Armv8-A ISA☆59Updated 2 years ago
- A library to assist writing memory-unsafe code in "pure" python, without any imports (i.e. no ctypes etc.)☆222Updated 3 months ago
- ☆113Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆111Updated 9 months ago
- Determine which CPU architecture is used in a binary file.☆118Updated 2 months ago
- Proof-of-concept for Spook.js☆70Updated 3 years ago
- ☆77Updated 3 years ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆114Updated 3 years ago
- libLISA: Instruction Discovery and Analysis on x86-64☆113Updated 2 months ago