comsec-group / retbleed
Arbitrary Speculative Code Execution with Return Instructions
☆157Updated last year
Alternatives and similar repositories for retbleed:
Users that are interested in retbleed are comparing it to the libraries listed below
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆113Updated 2 years ago
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆289Updated this week
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆79Updated 2 years ago
- Binarly Vulnerability Research Advisories☆171Updated 3 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆50Updated 2 weeks ago
- ☆114Updated last year
- ☆112Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆155Updated 2 years ago
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- Binary Type Inference Ghidra Plugin☆153Updated last year
- ☆92Updated 8 months ago
- LKRG bypass methods☆71Updated 5 years ago
- Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.☆89Updated last year
- Explore a live Linux kernel's memory using GDB☆114Updated 2 years ago
- ☆154Updated 2 months ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆434Updated 11 months ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆72Updated 2 years ago
- Spectre based on Linear Address Masking☆68Updated last year
- ☆71Updated last year
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆118Updated 9 months ago
- A Rowhammer fuzzer for AMD Zen-based systems (USENIX Security '24).☆47Updated 7 months ago
- ☆83Updated 6 months ago
- Proof-of-concept for the GhostWrite CPU bug.☆106Updated 7 months ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆33Updated last year
- A binary hardening system☆103Updated last year
- ☆178Updated last year
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆471Updated 8 months ago
- The first analysis framework for CPU microcode☆387Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆65Updated last year
- Docs and resources on CPU Speculative Execution bugs☆373Updated 7 years ago