iisys-sns / FlippyRAMLinks
FlippyRAM is an automated framework for testing and analyzing Rowhammer vulnerabilities in DRAM. It combines rowhammer tools and supports both Docker and ISO-based execution, making it a powerful resource for hardware security research.
☆21Updated last month
Alternatives and similar repositories for FlippyRAM
Users that are interested in FlippyRAM are comparing it to the libraries listed below
Sorting:
- Research tools developed for Intel Wi-Fi chips☆56Updated 5 months ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆48Updated last year
- Determine which CPU architecture is used in a binary file.☆124Updated 8 months ago
- Identify and extract files from container formats using unblob.☆25Updated last year
- Binary Ninja plugin for the Avnera AV6xxx/AV7xxx architecture☆28Updated 7 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆171Updated last year
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Updated last year
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Updated 2 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Updated last year
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
- SCARR is a Side-Channel Analysis (SCA) framework☆75Updated last week
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆53Updated 8 months ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated this week
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆16Updated last month
- Proof-of-concept for the GhostWrite CPU bug.☆115Updated last year
- Spectre based on Linear Address Masking☆67Updated last year
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆19Updated last year
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆57Updated last week
- Tool for decrypting Supermicro BMC firmware images☆33Updated 5 years ago
- ☆59Updated 2 years ago
- Ledger Donjon CTF 2020☆17Updated 4 years ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆58Updated 5 months ago
- Binary Type Inference Ghidra Plugin☆166Updated last year
- machine check exploitation☆50Updated 3 months ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆102Updated 9 months ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆37Updated 4 months ago
- Chip'olino - hardware & software platform for research in the field "Power Attacks"☆44Updated 3 months ago
- M1 bare metal project in Rust☆31Updated 3 years ago