Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"
☆41Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for pp0
Users that are interested in pp0 are comparing it to the libraries listed below
Sorting:
- ☆11Nov 27, 2024Updated last year
- ☆12Jun 8, 2021Updated 4 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆25Oct 15, 2021Updated 4 years ago
- Fuzzing Parsers with Tokens☆33Jan 14, 2021Updated 5 years ago
- Proof-of-concept implementation for the paper "SegScope: Probing Fine-grained Interrupts via Architectural Footprints" (HPCA'24)☆19Jan 26, 2026Updated last month
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Apr 21, 2020Updated 5 years ago
- vasilisk☆19Dec 23, 2019Updated 6 years ago
- ☆48Nov 4, 2022Updated 3 years ago
- ☆35Feb 4, 2026Updated last month
- ☆25Feb 6, 2024Updated 2 years ago
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Dr. Disassembler☆38Jan 5, 2022Updated 4 years ago
- Vulnerability analysis and proof of concepts☆38May 15, 2023Updated 2 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆75Nov 27, 2021Updated 4 years ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- A toy code generator (i.e. "program synthesis") using the Z3 solver☆35Nov 13, 2017Updated 8 years ago
- Revizor - Hardware fuzzing for the age of speculation☆179Updated this week
- light ifconfig☆14Apr 13, 2019Updated 6 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Jul 27, 2021Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆38Jun 21, 2019Updated 6 years ago
- Experimental GearVR app to view manga.☆11Apr 20, 2016Updated 9 years ago
- pnpm update for pnpm workspace catalogs.☆16Mar 25, 2025Updated 11 months ago
- A toy LDAP server in C for illustrative purposes☆12Apr 6, 2011Updated 14 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- ☆11Oct 17, 2024Updated last year
- Script to import ProtonVPN configuration files into NetworkManager automatically☆10Feb 6, 2020Updated 6 years ago
- Constraint solver based on abstract interpretation☆10Dec 20, 2024Updated last year
- Some examples of integrations with Transcend in various languages.☆11Dec 22, 2025Updated 2 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago