isec-tugraz / CJAGLinks
CJAG is an open-source implementation of our cache-based jamming agreement.
☆283Updated 3 years ago
Alternatives and similar repositories for CJAG
Users that are interested in CJAG are comparing it to the libraries listed below
Sorting:
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆290Updated 3 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Microcode parser for AMD, Intel, and VIA processors☆134Updated 9 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- Missed optimizations in C compilers☆341Updated 7 years ago
- Inline C/asm in Bash☆251Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept☆520Updated 4 years ago
- Presentation: Debugging across pipes and sockets with strace☆151Updated 6 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Simple Driver code for vmlaunch☆159Updated 7 years ago
- ☆287Updated 8 years ago
- x86 (MS-DOS) documentation, disassembler and emulator - WIP☆308Updated 8 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆679Updated 3 years ago
- How to backdoor Diffie-Hellman☆612Updated 8 years ago
- The engine that powers DeLorean!☆835Updated 5 years ago
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- The dissection of a simple "hello world" ELF binary.☆463Updated 4 years ago
- Constant-Time Toolkit☆296Updated 6 years ago
- Enable piping of internal command output to external commands☆71Updated 6 years ago
- SLAyer is an automatic formal verification tool that uses separation logic to verify memory safety of C programs.☆326Updated 8 years ago
- A list of publicly known but unfixed security bugs☆237Updated 7 years ago
- Reverse Engineering Page Table Caches in Your Processor☆371Updated 4 years ago
- ☆77Updated 7 years ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆248Updated 8 years ago
- Wireshark-Specific Dissector Language☆198Updated 7 years ago
- ☆469Updated 6 months ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago