☆15May 30, 2023Updated 2 years ago
Alternatives and similar repositories for hyperbleed
Users that are interested in hyperbleed are comparing it to the libraries listed below
Sorting:
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- WiSARD Weightless Neural Network (WNN) Model implemented in Julia.☆12Apr 3, 2024Updated last year
- A Helpful API that gets every Opened Discipline of The Federal University of Rio de Janeiro☆12Oct 9, 2024Updated last year
- made in <flag> badges for your projects☆20Jun 2, 2023Updated 2 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Jul 4, 2024Updated last year
- Medusa Repository: Transynther tool and Medusa Attack☆23Jul 17, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58May 8, 2024Updated last year
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Jan 26, 2022Updated 4 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- Website and PoC collection for transient execution attacks☆202Mar 9, 2024Updated last year
- ☆74Nov 19, 2022Updated 3 years ago
- ☆37Jun 19, 2019Updated 6 years ago
- Design and Verification of a Complete Application Specific Integrated Circuit☆12Nov 21, 2016Updated 9 years ago
- ELT write-ups repository.☆40Jan 31, 2023Updated 3 years ago
- Microarchitectural exploitation and other hardware attacks.☆96Mar 25, 2024Updated last year
- Full Machine Learning lifecycle with MLFlow, DVC, Docker, Kubernetes and Airflow on the cloud (AWS)☆15May 30, 2024Updated last year
- Tool to Analyze Speculative Execution Attacks and Mitigations☆56Dec 8, 2021Updated 4 years ago
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆14Aug 17, 2023Updated 2 years ago
- Data Plane Development Kit☆12Nov 10, 2025Updated 3 months ago
- TFA project for indirect call analysis☆10Mar 13, 2025Updated 11 months ago
- Interact with any contract on-chain (no-ABI/source code needed; the interface is decoded from the bytecode)☆19Dec 21, 2025Updated 2 months ago
- A HTTP client in Golang.☆15Jan 30, 2026Updated last month
- ☆14Feb 7, 2023Updated 3 years ago
- Linux kernel SGX driver for Graphene☆12Nov 3, 2020Updated 5 years ago
- Linux kernel branches for confidential compute research☆20Mar 31, 2025Updated 11 months ago
- Course - Developing 2D Games☆14Jul 27, 2021Updated 4 years ago
- ☆17Feb 11, 2026Updated 2 weeks ago
- A simple viewer of the cutoff scores for all Brazilian universities participating in SISU☆16Dec 26, 2023Updated 2 years ago
- 🔵 QUBO Annealing & Sampling MOI Interfaces☆15Apr 4, 2023Updated 2 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Aug 9, 2024Updated last year
- One line Brainfuck interpreter in Python☆15Oct 10, 2021Updated 4 years ago
- A collection of studies with Nginx☆13Jan 23, 2023Updated 3 years ago
- Parallelized web crawler written in Golang☆15Oct 2, 2018Updated 7 years ago
- Fine-grained frequency and voltage transition tests☆25Jun 11, 2023Updated 2 years ago
- Bootloader for OpenComputers☆10Oct 3, 2023Updated 2 years ago
- ☆15Dec 12, 2023Updated 2 years ago