badramattack / badram
☆47Updated 2 weeks ago
Alternatives and similar repositories for badram:
Users that are interested in badram are comparing it to the libraries listed below
- Intel Hardware Trace Library☆66Updated 5 months ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆27Updated last year
- ☆34Updated last year
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆60Updated 6 months ago
- A dynamically loadable virtual-machine based rootkit designed for Linux Kernel v5.13.0 using AMD-V (SVM).☆28Updated 2 years ago
- Materials for my DMA attacks talk and a collection of related links☆45Updated 8 months ago
- Binary exploitation by confusing the unwinder☆59Updated last year
- ☆69Updated 11 months ago
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆100Updated 10 months ago
- How to use LLVM passes☆30Updated 2 years ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆48Updated 2 months ago
- Symbolic executor for Binary Ninja's MLIL☆22Updated 4 months ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆58Updated last year
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆39Updated last year
- ☆23Updated last year
- Uncovering Container Confusion in the Linux Kernel☆43Updated 11 months ago
- Unicorn Engine port for UEFI firmware☆46Updated 2 months ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆15Updated last week
- Hyper-V related resources☆30Updated 10 months ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Updated 2 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆43Updated last month
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆50Updated 6 months ago
- Linux kernel branches for confidential compute research☆17Updated last week
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆79Updated last year
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆16Updated 7 months ago
- Simple Intel VT-x type-2 hypervisor for 64-bit Linux.☆17Updated 4 years ago
- kAFL Fuzzer☆33Updated this week
- AMD SVM hypervisor rootkit proof of concept☆44Updated last year
- Python bindings for BochsCPU☆35Updated this week
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated 9 months ago