☆471Nov 20, 2024Updated last year
Alternatives and similar repositories for portsmash
Users that are interested in portsmash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept☆539Jun 12, 2020Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,421Nov 15, 2018Updated 7 years ago
- ☆74Dec 27, 2017Updated 8 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The code to the SGX-ROP paper☆183Apr 4, 2020Updated 6 years ago
- Reverse Engineering Page Table Caches in Your Processor☆371May 5, 2021Updated 4 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- Hardware backdoors in some x86 CPUs☆2,391Oct 12, 2018Updated 7 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last month
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 6 years ago
- RIDL test suite and exploits☆365Jun 9, 2020Updated 5 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 5 months ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A practical attack framework for precise enclave execution control☆473Mar 23, 2026Updated 2 weeks ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Proof-of-concept for the ZombieLoad attack☆828Dec 24, 2021Updated 4 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Oct 21, 2018Updated 7 years ago
- The x86 processor fuzzer☆5,017Feb 20, 2024Updated 2 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- 基于WinDivert实现的一个包过滤与截断程序☆13Jul 22, 2018Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 12 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆6,128Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆80May 10, 2018Updated 7 years ago
- ☆171Mar 15, 2021Updated 5 years ago
- ☆34Dec 14, 2025Updated 3 months ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 9 years ago