iisys-sns / FlippyRAMLinks
FlippyRAM is an automated framework for testing and analyzing Rowhammer vulnerabilities in DRAM. It combines rowhammer tools and supports both Docker and ISO-based execution, making it a powerful resource for hardware security research.
☆19Updated 7 months ago
Alternatives and similar repositories for FlippyRAM
Users that are interested in FlippyRAM are comparing it to the libraries listed below
Sorting:
- iTLB multihit PoC☆42Updated last year
- Research tools developed for Intel Wi-Fi chips☆55Updated 2 months ago
- Determine which CPU architecture is used in a binary file.☆121Updated 5 months ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Updated last year
- Thunderclap QEMU-based network card emulation☆28Updated 2 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆51Updated 5 months ago
- Rust library for parsing a number of firmware images☆14Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- Binary Ninja plugin for the Avnera AV6xxx/AV7xxx architecture☆27Updated 4 months ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆20Updated 10 months ago
- amd-nv-tool can extract and modify information from BIOS images of AMD systems☆14Updated 2 years ago
- ☆52Updated 4 months ago
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
- Binja loader for AMD-SP or PSP firmware binaries.☆36Updated 2 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆62Updated last year
- ☆18Updated 4 years ago
- Identify and extract files from container formats using unblob.☆25Updated 9 months ago
- machine check exploitation☆30Updated 2 weeks ago
- ☆16Updated 4 years ago
- Binary Type Inference Ghidra Plugin☆165Updated last year
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Modern exploit in Golang for ancient Nagra / Dish Network cards.☆30Updated 6 months ago
- Exploit generator for Intel ME 11 buffer overflow☆33Updated 5 years ago
- decode bits into bytes☆46Updated 5 years ago
- Spectre based on Linear Address Masking☆69Updated last year
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆54Updated 2 months ago
- ☆15Updated 2 years ago