gamozolabs / vectorized_mmuLinks
Snapshot of the vectorized MMU that lines up with the vectorized MMU blog
☆23Updated 5 years ago
Alternatives and similar repositories for vectorized_mmu
Users that are interested in vectorized_mmu are comparing it to the libraries listed below
Sorting:
- A super simple RV32i JIT, designed for ease of understanding and modification☆87Updated 2 years ago
- x86 decoders for the yaxpeax project☆140Updated 2 months ago
- Why fuzzing with emulators is amazing☆140Updated 5 years ago
- program analysis for machine code☆36Updated 4 years ago
- Some Rust bindings for Binary Ninja☆31Updated 2 years ago
- A div-less, mul-less, atomic-less `rv64i` compiler toolchain using purely clang, musl, and compiler-rt☆31Updated 5 years ago
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆70Updated last year
- Self-hosting binary instrumentation framework for security research☆217Updated 2 years ago
- Symbolic Execution over Falcon IL☆30Updated 4 years ago
- Safely execute an arbitrary x86 instruction☆186Updated last year
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆17Updated last week
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- X86 disassembler benchmark☆64Updated last month
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- print information from LLVM dataflow analyses☆13Updated 5 years ago
- yaxdis, a small and naive disassembler using yaxpeax decoders☆34Updated 7 months ago
- Load-time selective binary rewriting☆162Updated 3 years ago
- A debugger for Linux in Rust☆76Updated 2 years ago
- A framework for instrumenting build tools☆90Updated last week
- A tool to enable fuzzing for Spectre vulnerabilities☆31Updated 5 years ago
- Fast program tracing and analysis☆17Updated 2 weeks ago
- Updates DWARF debug sections and ELF symbols with info obtained through disassembly☆30Updated last year
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆167Updated 5 years ago
- Ghidra Sleight (PCode) parsing library in Rust.☆44Updated 11 months ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆76Updated 3 years ago
- Semantics of x86-64 in K☆164Updated 5 years ago
- A (SLEIGH) disassembler that supports multiple architectures☆88Updated 3 years ago
- Automatic inference of a formal specification of the x86_64 instruction set☆71Updated 9 years ago
- Manipulate C-family ASTs with Clang☆68Updated 7 years ago