bbbrumley / portsmashLinks
☆470Updated 10 months ago
Alternatives and similar repositories for portsmash
Users that are interested in portsmash are comparing it to the libraries listed below
Sorting:
- RIDL test suite and exploits☆358Updated 5 years ago
- Proof-of-concept for the ZombieLoad attack☆817Updated 3 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373Updated 4 years ago
- Intel Management Engine JTAG Proof of Concept☆524Updated 5 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- TRRespass☆125Updated 4 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆186Updated 3 years ago
- ☆183Updated 4 years ago
- ☆149Updated 6 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,415Updated 6 years ago
- Understand and mitigate software-observable side-channels☆502Updated 4 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- Meltdown Exploit PoC☆948Updated 7 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆292Updated 3 years ago
- ☆252Updated 4 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆347Updated 6 years ago
- Proof of concept code for the Spectre CPU exploit.☆307Updated 2 years ago
- ROCA: Infineon RSA key vulnerability☆487Updated last year
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆157Updated 8 years ago
- The x86 processor fuzzer☆513Updated 6 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆771Updated 7 years ago
- Kernel Thread Sanitizer, a fast data race detector for the Linux kernel☆570Updated 3 years ago
- Conference slides and White-papers☆358Updated 5 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆188Updated 8 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆402Updated last year
- Adiantum and HPolyC specification and test vectors☆477Updated last year
- GLM uCode dumps☆290Updated 5 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- A kernelspace syscall interceptor and randomized faulter☆354Updated 10 months ago