bbbrumley / portsmashLinks
☆470Updated 9 months ago
Alternatives and similar repositories for portsmash
Users that are interested in portsmash are comparing it to the libraries listed below
Sorting:
- RIDL test suite and exploits☆357Updated 5 years ago
- Proof-of-concept for the ZombieLoad attack☆818Updated 3 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373Updated 4 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,414Updated 6 years ago
- Intel Management Engine JTAG Proof of Concept☆521Updated 5 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- TRRespass☆125Updated 4 years ago
- Meltdown Exploit PoC☆949Updated 7 years ago
- ROCA: Infineon RSA key vulnerability☆486Updated last year
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- ☆183Updated 4 years ago
- ☆149Updated 6 years ago
- The x86 processor fuzzer☆511Updated 6 years ago
- Avast JavaScript Interactive Shell☆674Updated 5 years ago
- ☆252Updated 4 years ago
- Conference slides and White-papers☆358Updated 5 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆343Updated 6 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆291Updated 3 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆770Updated 7 years ago
- Kernel Thread Sanitizer, a fast data race detector for the Linux kernel☆571Updated 3 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Intel ME 11.x Firmware Images Unpacker☆627Updated 6 years ago
- A fast, parallel test case minimization tool.☆969Updated 4 years ago
- Understand and mitigate software-observable side-channels☆501Updated 4 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆402Updated last year
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- Proof of concept code for the Spectre CPU exploit.☆306Updated 2 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- Tear the firmware apart with your bare hands;-)☆193Updated 3 weeks ago