☆471Nov 20, 2024Updated last year
Alternatives and similar repositories for portsmash
Users that are interested in portsmash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept☆541Jun 12, 2020Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,422Nov 15, 2018Updated 7 years ago
- ☆74Dec 27, 2017Updated 8 years ago
- The code to the SGX-ROP paper☆183Apr 4, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Proof-of-concept code for the SMoTherSpectre exploit.☆76Nov 12, 2019Updated 6 years ago
- Reverse Engineering Page Table Caches in Your Processor☆372May 5, 2021Updated 5 years ago
- A Tool for the Static Analysis of Cache Side Channels☆43Mar 5, 2017Updated 9 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 2 months ago
- Hardware backdoors in some x86 CPUs☆2,395Oct 12, 2018Updated 7 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆37Feb 28, 2020Updated 6 years ago
- RIDL test suite and exploits☆364Jun 9, 2020Updated 5 years ago
- Some kernel exploits☆145Nov 7, 2017Updated 8 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A practical attack framework for precise enclave execution control☆474May 7, 2026Updated 2 weeks ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Proof-of-concept for the ZombieLoad attack☆829Dec 24, 2021Updated 4 years ago
- The x86 processor fuzzer☆5,023Feb 20, 2024Updated 2 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Feb 2, 2018Updated 8 years ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Oct 21, 2018Updated 7 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 10 months ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Medusa Repository: Transynther tool and Medusa Attack☆25Jul 17, 2020Updated 5 years ago
- 基于WinDivert实现的一个包过滤与截断程序☆13Jul 22, 2018Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆199Feb 22, 2018Updated 8 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 12 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆80May 10, 2018Updated 8 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆6,181May 15, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆35Dec 14, 2025Updated 5 months ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Nov 6, 2024Updated last year
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 9 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Jul 27, 2017Updated 8 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago