bbbrumley / portsmashLinks
☆471Updated 11 months ago
Alternatives and similar repositories for portsmash
Users that are interested in portsmash are comparing it to the libraries listed below
Sorting:
- RIDL test suite and exploits☆357Updated 5 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373Updated 4 years ago
- Proof-of-concept for the ZombieLoad attack☆818Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆527Updated 5 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,415Updated 7 years ago
- TRRespass☆125Updated 4 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- The x86 processor fuzzer☆516Updated 7 years ago
- Meltdown Exploit PoC☆948Updated 7 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- Conference slides and White-papers☆359Updated 5 years ago
- Understand and mitigate software-observable side-channels☆506Updated 4 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆349Updated 7 years ago
- ☆184Updated 4 years ago
- ☆152Updated 7 years ago
- ROCA: Infineon RSA key vulnerability☆489Updated 2 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆292Updated 3 years ago
- A fast, parallel test case minimization tool.☆973Updated 4 years ago
- Intel ME 11.x Firmware Images Unpacker☆634Updated 7 years ago
- ☆252Updated 4 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Awesome Firmware Security & Other Helpful Documents☆607Updated 6 years ago
- Proof of concept code for the Spectre CPU exploit.☆307Updated 2 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆773Updated 7 years ago
- Adiantum and HPolyC specification and test vectors☆477Updated last year
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- A Pwn2Own exploit chain☆755Updated 7 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago