This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)
☆26Mar 10, 2020Updated 6 years ago
Alternatives and similar repositories for lvi-lfb-attack-poc
Users that are interested in lvi-lfb-attack-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux☆14Oct 22, 2021Updated 4 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Jan 27, 2020Updated 6 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆30Oct 4, 2022Updated 3 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Proof of concept code for the Spectre CPU exploit.☆312Jan 28, 2023Updated 3 years ago
- ☆17Apr 28, 2026Updated last week
- Stable, non-KVM version of PTLsim.☆29Feb 16, 2016Updated 10 years ago
- ☆37May 5, 2021Updated 5 years ago
- HyperBench: A Benchmark Suite for Virtualization Capabilities☆31Nov 22, 2019Updated 6 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46May 19, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Memory consistency model checking and test generation library.☆15Oct 14, 2016Updated 9 years ago
- 学习数据结构和算法。☆16Nov 13, 2018Updated 7 years ago
- A practical attack framework for precise enclave execution control☆475Apr 9, 2026Updated 3 weeks ago
- A conda-smithy repository for memory_profiler.☆12Apr 22, 2026Updated 2 weeks ago
- A Wireshark dissector for Bluetooth Low Energy (BLE) advertisement packets of Apple Continuity, Microsoft CDP and Garmin proprietary prot…☆17Mar 13, 2020Updated 6 years ago
- Windows Snapshot Fuzzer (SNAFUzz)☆41Dec 17, 2025Updated 4 months ago
- Meeting materials☆24Apr 8, 2026Updated 3 weeks ago
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆20Jun 16, 2024Updated last year
- Transactional memory (mostly Intel® TSX) experiments☆14May 3, 2014Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- X86 Instruction Profiler☆13May 19, 2014Updated 11 years ago
- Operating system demonstrating system transactions☆17Apr 19, 2017Updated 9 years ago
- a rust version SPDM protocol implementation☆16Jun 20, 2023Updated 2 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated last month
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- 面向可信执行环境的OS。☆12May 9, 2025Updated 11 months ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- RIDL test suite and exploits☆365Jun 9, 2020Updated 5 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Spectre based on Linear Address Masking☆66Dec 4, 2023Updated 2 years ago
- ☆13Mar 28, 2022Updated 4 years ago
- This project was done as a part of RISC-V based MYTH (Microprocessor for you in Thirty Hours) workshop organized by Kunal Ghosh and Steve…☆17Sep 23, 2020Updated 5 years ago
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 12 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 8 months ago
- COATCheck☆13Nov 4, 2018Updated 7 years ago