Yossioren / pp0Links
Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"
☆40Updated 4 years ago
Alternatives and similar repositories for pp0
Users that are interested in pp0 are comparing it to the libraries listed below
Sorting:
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆76Updated 6 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆41Updated 3 years ago
- Mayhem example templates for programming languages and fuzzers that you love!☆36Updated last month
- Tool for testing and finding minimal eviction sets☆107Updated 4 years ago
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- Tools for "Another Flip in the Wall"☆39Updated 7 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 8 years ago
- A fuzzing framework for network servers☆118Updated 7 years ago
- ☆78Updated 4 years ago
- ☆77Updated 7 years ago
- Nailgun attack on ARM devices.☆164Updated 4 years ago
- Reproduce CVEs from ForAllSecure Vulnerabilities Lab☆113Updated 2 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 5 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- Improving side channel analysis techniques for CTF problems.☆12Updated 5 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 4 years ago
- Distributed fuzzing platform☆46Updated 2 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆71Updated 4 years ago
- Boring tool to launch multiple afl-fuzz instances☆52Updated 8 years ago
- A de-socketing library for fuzzing.☆161Updated 4 months ago
- TRRespass☆125Updated 4 years ago
- ☆15Updated 5 years ago
- Avalanche is a document generator which uses context-free grammars to generate randomized outputs for fuzz-testing.☆32Updated 4 years ago
- Automate generation of syzkaller's grammar☆15Updated 3 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- ☆152Updated 7 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago