☆15May 30, 2023Updated 2 years ago
Alternatives and similar repositories for hyperbleed
Users that are interested in hyperbleed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- WiSARD Weightless Neural Network (WNN) Model implemented in Julia.☆12Apr 3, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆59May 8, 2024Updated last year
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆28Nov 30, 2023Updated 2 years ago
- Website and PoC collection for transient execution attacks☆203Mar 9, 2024Updated 2 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆30Oct 4, 2022Updated 3 years ago
- ☆37Jun 19, 2019Updated 6 years ago
- Microarchitectural exploitation and other hardware attacks.☆97Mar 25, 2024Updated 2 years ago
- ☆16Nov 28, 2024Updated last year
- ☆17Jun 26, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Feb 7, 2023Updated 3 years ago
- TFA project for indirect call analysis☆13Mar 13, 2025Updated last year
- Linux kernel branches for confidential compute research☆20Updated this week
- Tool to Analyze Speculative Execution Attacks and Mitigations☆56Dec 8, 2021Updated 4 years ago
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆14Aug 17, 2023Updated 2 years ago
- ☆19Updated this week
- Use hardware performance counters to find mapping of addresses to L3 slices in Intel processors☆18Jul 30, 2023Updated 2 years ago
- Fine-grained frequency and voltage transition tests☆25Jun 11, 2023Updated 2 years ago
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Oct 13, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- QEMU-based Memory Sanitizer for binary software.☆23Nov 19, 2025Updated 4 months ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆17Jun 7, 2021Updated 4 years ago
- A browser extension that enhance your paper writting with ChatGPT☆27May 14, 2024Updated last year
- This repository contains the verification suite for verifying Berkeley Out-of-Order Machine (BOOM) against transient execution attacks ba…☆23Mar 2, 2023Updated 3 years ago
- ☆16Dec 12, 2023Updated 2 years ago
- ☆29Feb 20, 2024Updated 2 years ago
- rv8 benchmark suite☆25Jul 30, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Task: minimum complete example demonstrating programming using Intel's 'rdpmc' instruction☆22Apr 24, 2023Updated 2 years ago
- Repository of the paper "Reproducing Spectre Attack with gem5, How To Do It Right?"☆18Jul 27, 2023Updated 2 years ago
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago
- 用于抓取网页内容并制作 EPUB 的小工具。☆23Apr 27, 2023Updated 2 years ago
- Reworking of Agner Fog's performance test programs for Linux☆121Nov 4, 2025Updated 5 months ago
- Instruction latency & throughput profiler for AArch64☆43Aug 20, 2025Updated 7 months ago
- Red Teaming Tradecraft☆32Sep 28, 2022Updated 3 years ago