hw-sw-contracts / revizorView external linksLinks
Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs
☆41Dec 14, 2022Updated 3 years ago
Alternatives and similar repositories for revizor
Users that are interested in revizor are comparing it to the libraries listed below
Sorting:
- Revizor - Hardware fuzzing for the age of speculation☆180Jan 22, 2026Updated 3 weeks ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Aug 7, 2022Updated 3 years ago
- ☆11Nov 27, 2024Updated last year
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆22May 23, 2020Updated 5 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆23Jul 17, 2020Updated 5 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆19Jul 14, 2020Updated 5 years ago
- ☆45Jul 19, 2023Updated 2 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆46Aug 25, 2021Updated 4 years ago
- An Input Validator for HTTP based on Context-free Languages☆15Apr 27, 2017Updated 8 years ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Apr 21, 2020Updated 5 years ago
- XML representation of the x86 instruction set☆29Updated this week
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆16Oct 8, 2024Updated last year
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58May 8, 2024Updated last year
- A tool for checking the contract satisfaction for hardware designs☆12Nov 4, 2025Updated 3 months ago
- Microarchitectural exploitation and other hardware attacks.☆96Mar 25, 2024Updated last year
- ☆11Jul 1, 2025Updated 7 months ago
- Iodine: Verifying Constant-Time Execution of Hardware☆15Mar 29, 2021Updated 4 years ago
- Tool for testing and finding minimal eviction sets☆107May 6, 2021Updated 4 years ago
- Benchmarking code for evaluating the cost of cache coherence protocols implemented on different platforms☆14Apr 13, 2021Updated 4 years ago
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆14Aug 17, 2023Updated 2 years ago
- ☆15Feb 9, 2026Updated last week
- ☆13Mar 28, 2020Updated 5 years ago
- ☆12Jan 8, 2016Updated 10 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- ☆48Dec 19, 2018Updated 7 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- The artifact for SecSMT paper -- Usenix Security 2022☆31Oct 4, 2022Updated 3 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- Convert a raw firmware image to an ELF file.☆13Feb 6, 2019Updated 7 years ago
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆19Dec 17, 2025Updated 2 months ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆121Apr 12, 2022Updated 3 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 5 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago