☆15May 30, 2023Updated 2 years ago
Alternatives and similar repositories for hyperbleed
Users that are interested in hyperbleed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆25Jul 17, 2020Updated 5 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆22Jul 4, 2024Updated last year
- ☆73Nov 19, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆61May 8, 2024Updated 2 years ago
- Website and PoC collection for transient execution attacks☆204Mar 9, 2024Updated 2 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆62Apr 27, 2020Updated 6 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆30Oct 4, 2022Updated 3 years ago
- ☆37Jun 19, 2019Updated 6 years ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Jan 26, 2022Updated 4 years ago
- Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.☆17Feb 25, 2026Updated 2 months ago
- Microarchitectural exploitation and other hardware attacks.☆97Mar 25, 2024Updated 2 years ago
- ☆16Nov 28, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆17Jun 26, 2025Updated 10 months ago
- ☆14Feb 7, 2023Updated 3 years ago
- TFA project for indirect call analysis☆13Mar 13, 2025Updated last year
- Linux kernel branches for confidential compute research☆20Apr 6, 2026Updated last month
- Data Plane Development Kit☆13Nov 10, 2025Updated 6 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆61Aug 9, 2024Updated last year
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆14Aug 17, 2023Updated 2 years ago
- ☆22May 8, 2026Updated last week
- Use hardware performance counters to find mapping of addresses to L3 slices in Intel processors☆18Jul 30, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Fine-grained frequency and voltage transition tests☆25Jun 11, 2023Updated 2 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- Spectre-based Meltdown attack (i.e. 2-in1) proof of concept in 99 lines of code. For more details see 'The Spectre of Meltdowns' present…☆14Jun 21, 2018Updated 7 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Oct 13, 2022Updated 3 years ago
- Design and Verification of a Complete Application Specific Integrated Circuit☆12Nov 21, 2016Updated 9 years ago
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.☆20Apr 26, 2026Updated 3 weeks ago
- QEMU-based Memory Sanitizer for binary software.☆23Nov 19, 2025Updated 6 months ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆17Jun 7, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repository contains the verification suite for verifying Berkeley Out-of-Order Machine (BOOM) against transient execution attacks ba…☆24Mar 2, 2023Updated 3 years ago
- ☆31Feb 20, 2024Updated 2 years ago
- ☆16Dec 12, 2023Updated 2 years ago
- Task: minimum complete example demonstrating programming using Intel's 'rdpmc' instruction☆22Apr 24, 2023Updated 3 years ago
- rv8 benchmark suite☆25Jul 30, 2020Updated 5 years ago
- Repository of the paper "Reproducing Spectre Attack with gem5, How To Do It Right?"☆18Jul 27, 2023Updated 2 years ago
- Exercício de aquecimento para a formação em infraestrutura do Escritório de Dados☆13Aug 5, 2022Updated 3 years ago