bbbrumley / portsmashLinks
☆470Updated 7 months ago
Alternatives and similar repositories for portsmash
Users that are interested in portsmash are comparing it to the libraries listed below
Sorting:
- RIDL test suite and exploits☆355Updated 5 years ago
- Reverse Engineering Page Table Caches in Your Processor☆371Updated 4 years ago
- Proof-of-concept for the ZombieLoad attack☆817Updated 3 years ago
- ☆183Updated 4 years ago
- Understand and mitigate software-observable side-channels☆501Updated 4 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- ☆149Updated 6 years ago
- Meltdown Exploit PoC☆948Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept☆519Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,411Updated 6 years ago
- A Pwn2Own exploit chain☆761Updated 6 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆402Updated last year
- TRRespass☆124Updated 4 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆342Updated 6 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆283Updated 3 years ago
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- Conference slides and White-papers☆357Updated 5 years ago
- The x86 processor fuzzer☆509Updated 6 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- ☆251Updated 4 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆290Updated 3 years ago
- Avast JavaScript Interactive Shell☆672Updated 5 years ago
- GLM uCode dumps☆289Updated 5 years ago
- Proof of concept code for the Spectre CPU exploit.☆305Updated 2 years ago
- Various PoCs☆491Updated 5 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆183Updated 7 years ago
- Notes on various topics I'm interested in☆158Updated 9 years ago
- ROCA: Infineon RSA key vulnerability☆486Updated last year
- Linux i386 tool to load and execute ME modules.☆133Updated 4 years ago