antoonpurnal / clangover
☆18Updated 7 months ago
Alternatives and similar repositories for clangover:
Users that are interested in clangover are comparing it to the libraries listed below
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆59Updated last month
- ☆32Updated 4 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆11Updated 2 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆72Updated 2 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- ☆112Updated last year
- ☆29Updated 2 months ago
- Explore a live Linux kernel's memory using GDB☆113Updated 2 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆60Updated 5 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆46Updated last month
- Research tools developed for Intel Wi-Fi chips☆50Updated last year
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆139Updated 3 years ago
- ☆78Updated 3 years ago
- Side-channel traces visualizer☆13Updated last month
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 2 years ago
- A tool to perform so called BGE attack☆22Updated 9 months ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆35Updated 2 years ago
- rev.ng configuration for orchestra. The starting point for any development.☆32Updated 3 weeks ago
- ☆25Updated last year
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆43Updated 6 months ago
- ☆13Updated last year
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆80Updated last year
- Determine which CPU architecture is used in a binary file.☆106Updated 10 months ago
- A Rowhammer fuzzer for AMD Zen-based systems (USENIX Security '24).☆45Updated 6 months ago
- Tool to Analyze Speculative Execution Attacks and Mitigations☆54Updated 3 years ago
- Linux kernel source tree☆17Updated last month
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆31Updated last year
- plugin for storing and using snippets of useful Binja script☆22Updated 4 months ago