CJAG is an open-source implementation of our cache-based jamming agreement.
☆284Dec 24, 2021Updated 4 years ago
Alternatives and similar repositories for CJAG
Users that are interested in CJAG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- The DrK Attack - Proof of concept☆348Mar 13, 2022Updated 4 years ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆519Jun 15, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Oct 21, 2018Updated 7 years ago
- Open Network Linux Platform Infrastructure☆17Sep 18, 2018Updated 7 years ago
- ☆22Jun 24, 2019Updated 6 years ago
- A variety of content chunking algorithms with a common API in rust☆18Jun 18, 2023Updated 2 years ago
- Codec tools for the twitter mux protocol☆12Apr 21, 2016Updated 10 years ago
- x86-64 assembler library☆488Jan 15, 2021Updated 5 years ago
- Translator from asm to C, but not decompiler. Something between compiler and decompiler.☆56Aug 31, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A direct-to-syslog logger over udp for Erlang☆11Sep 1, 2020Updated 5 years ago
- Reverse Engineering Page Table Caches in Your Processor☆372May 5, 2021Updated 5 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Dec 14, 2022Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 10 months ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Jul 12, 2016Updated 9 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- The x86 processor fuzzer☆5,022Feb 20, 2024Updated 2 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- I-cache line packing and branch misprediction measuring tool☆18Dec 1, 2016Updated 9 years ago
- like ~~grep~~ UBER, but for binaries☆1,773Jan 5, 2026Updated 4 months ago
- lite version of glib that only contains ghash, glist, gslist, gqueue, and gmem.☆13Feb 20, 2017Updated 9 years ago
- This project has been moved to:☆1,460Apr 7, 2021Updated 5 years ago
- ☆14Jun 22, 2019Updated 6 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- The X86 Encoder Decoder (XED), is a software library for encoding and decoding X86 (IA32 and Intel64) instructions☆1,585Mar 19, 2026Updated last month
- Etch-A-SDR Project☆49Mar 24, 2016Updated 10 years ago
- Tool for automated testing and analysis of Intel x86-64 undocumented instructions in user mode and in the kernel☆46May 10, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Run any command transparently in a VM (this repo isn't part of Cappsule)☆27Apr 12, 2017Updated 9 years ago
- Implementation of KangarooTwelve in Go☆94Jun 14, 2021Updated 4 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Jan 27, 2020Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Parallel sections library for parallel data-structures☆14Oct 30, 2023Updated 2 years ago
- capstone based disassembler for extracting to binnavi☆230Jun 8, 2016Updated 9 years ago
- A public database for software and firmware hashes☆215Nov 12, 2016Updated 9 years ago