antoonpurnal / clangoverLinks
☆18Updated last year
Alternatives and similar repositories for clangover
Users that are interested in clangover are comparing it to the libraries listed below
Sorting:
- My experiments in understanding AES, Whitebox AES, and related attacks☆17Updated 4 years ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆76Updated 7 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- A more realistic demo of a buffer overflow cause by -ffast-math☆14Updated 2 years ago
- GoTEE - example application☆16Updated 3 months ago
- A tool to perform so called BGE attack☆24Updated 2 weeks ago
- ☆112Updated last year
- Overview of Secure-Launch process on Qualcomm devices☆60Updated last year
- A repository of tools for verifying constant-timeness☆18Updated 4 months ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆74Updated 2 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆52Updated last month
- The public release of LeftoverLocals code☆67Updated last year
- Go Trusted Execution Environment (TEE)☆126Updated 3 months ago
- ☆27Updated 2 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆43Updated 2 years ago
- ☆30Updated last month
- Constant-time choose between two variables in Clang/LLVM☆20Updated 7 years ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆93Updated 4 months ago
- Minimal setup to trigger the xz backdoor☆28Updated 8 months ago
- ☆31Updated 4 years ago
- simple type recognition in decompiled executables☆111Updated 11 months ago
- Research tools developed for Intel Wi-Fi chips☆54Updated 2 weeks ago
- Proof-of-concept implementation for the paper "Reviving Meltdown 3a" (ESORICS 2023)☆15Updated last year
- QARMA block cipher in C☆30Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- Student Starter Code for Secure Hardware Design at MIT☆76Updated last year
- Determine which CPU architecture is used in a binary file.☆119Updated 3 months ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- ☆42Updated 2 weeks ago