bbbrumley / portsmashLinks
☆469Updated 6 months ago
Alternatives and similar repositories for portsmash
Users that are interested in portsmash are comparing it to the libraries listed below
Sorting:
- RIDL test suite and exploits☆355Updated 4 years ago
- Reverse Engineering Page Table Caches in Your Processor☆371Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆519Updated 4 years ago
- Understand and mitigate software-observable side-channels☆501Updated 4 years ago
- ☆183Updated 4 years ago
- Proof-of-concept for the ZombieLoad attack☆816Updated 3 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- ☆149Updated 6 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,410Updated 6 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆290Updated 3 years ago
- Avast JavaScript Interactive Shell☆671Updated 5 years ago
- Meltdown Exploit PoC☆947Updated 7 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆402Updated last year
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆679Updated 3 years ago
- ☆251Updated 4 years ago
- TRRespass☆124Updated 4 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆283Updated 3 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆342Updated 6 years ago
- A kernelspace syscall interceptor and randomized faulter☆354Updated 6 months ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆767Updated 7 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆183Updated 7 years ago
- The x86 processor fuzzer☆506Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- ROCA: Infineon RSA key vulnerability☆486Updated last year
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆512Updated 3 years ago
- ☆151Updated 7 years ago
- Website and PoC collection for transient execution attacks☆182Updated last year
- Intel ME 11.x Firmware Images Unpacker☆623Updated 6 years ago