Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)
☆17Sep 15, 2025Updated 5 months ago
Alternatives and similar repositories for hammulator
Users that are interested in hammulator are comparing it to the libraries listed below
Sorting:
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- An example model of a Network Processing Unit using the PFPSim framework.☆13Aug 23, 2016Updated 9 years ago
- New Cache implementation using Gem5☆13Apr 2, 2014Updated 11 years ago
- Fine-grained frequency and voltage transition tests☆25Jun 11, 2023Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆21May 17, 2022Updated 3 years ago
- ☆20May 31, 2024Updated last year
- XML representation of the x86 instruction set☆29Feb 15, 2026Updated last week
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 4 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Flex 'em lexers☆42Oct 19, 2020Updated 5 years ago
- Create CFGs and compute complexity metrics for Python, C++, and Java code.☆43May 10, 2024Updated last year
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Performance Counter Measurements at the cycle granularity☆18Jul 9, 2021Updated 4 years ago
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- lxfuzz is a grey-box kernel fuzzer used for linux. it is scalable because of qemu being used to emulate in a way to be able to freely cho…☆22Jul 21, 2024Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Aug 11, 2023Updated 2 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- poststructural fuzzing☆31Jan 29, 2020Updated 6 years ago
- ☆65Oct 17, 2023Updated 2 years ago
- Tool for testing and finding minimal eviction sets☆107May 6, 2021Updated 4 years ago
- gradient-based symbolic execution engine implemented from scratch☆36Dec 16, 2023Updated 2 years ago
- ☆23May 19, 2019Updated 6 years ago
- IntroVirt is an guest introspection library for KVM☆63Updated this week
- Apple Baseband Sourcecode☆29Sep 30, 2018Updated 7 years ago
- weggli ruleset scanner for source code and binaries☆39Nov 16, 2025Updated 3 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- Decode machine code into VEX IR and translate into LLVM IR☆28Jun 1, 2019Updated 6 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- LPE exploit for a UAF in Windows (CVE-2021-40449).☆45Nov 5, 2021Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆74May 19, 2017Updated 8 years ago