☆470Nov 20, 2024Updated last year
Alternatives and similar repositories for portsmash
Users that are interested in portsmash are comparing it to the libraries listed below
Sorting:
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept☆538Jun 12, 2020Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,421Nov 15, 2018Updated 7 years ago
- ☆74Dec 27, 2017Updated 8 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- The code to the SGX-ROP paper☆183Apr 4, 2020Updated 5 years ago
- Reverse Engineering Page Table Caches in Your Processor☆374May 5, 2021Updated 4 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- Hardware backdoors in some x86 CPUs☆2,389Oct 12, 2018Updated 7 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 6 years ago
- RIDL test suite and exploits☆365Jun 9, 2020Updated 5 years ago
- This repository contains several tools to perform Cache Template Attacks☆165Nov 11, 2025Updated 4 months ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- A practical attack framework for precise enclave execution control☆471Jan 16, 2026Updated 2 months ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Proof-of-concept for the ZombieLoad attack☆829Dec 24, 2021Updated 4 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Oct 21, 2018Updated 7 years ago
- The x86 processor fuzzer☆5,011Feb 20, 2024Updated 2 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- JEFF file format tools☆27Dec 24, 2015Updated 10 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- 基于WinDivert实现的一个包过滤与截断程序☆13Jul 22, 2018Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 11 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆80May 10, 2018Updated 7 years ago
- ☆171Mar 15, 2021Updated 5 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆6,103Updated this week
- ☆34Dec 14, 2025Updated 3 months ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 9 years ago