CJAG is an open-source implementation of our cache-based jamming agreement.
☆285Dec 24, 2021Updated 4 years ago
Alternatives and similar repositories for CJAG
Users that are interested in CJAG are comparing it to the libraries listed below
Sorting:
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆223Dec 24, 2021Updated 4 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆522Jun 15, 2025Updated 8 months ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- x86-64 assembler library☆490Jan 15, 2021Updated 5 years ago
- coming soon☆15Apr 16, 2022Updated 3 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Translator from asm to C, but not decompiler. Something between compiler and decompiler.☆56Aug 31, 2021Updated 4 years ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- This project has been moved to:☆1,459Apr 7, 2021Updated 4 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆700May 13, 2022Updated 3 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373May 5, 2021Updated 4 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- The x86 processor fuzzer☆5,008Feb 20, 2024Updated 2 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Oct 21, 2018Updated 7 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- like ~~grep~~ UBER, but for binaries☆1,766Jan 5, 2026Updated 2 months ago
- The X86 Encoder Decoder (XED), is a software library for encoding and decoding X86 (IA32 and Intel64) instructions☆1,567Feb 18, 2026Updated 2 weeks ago
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Extended Roofline Model - LLVM source tree with additional libraries for the analysis of the dynamic execution in the interpreter☆17Jul 5, 2017Updated 8 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Parallel sections library for parallel data-structures☆14Oct 30, 2023Updated 2 years ago
- A Python implementation of Douglas Hofstadter formal systems, from his book "Gödel, Escher, Bach"☆626Mar 25, 2021Updated 4 years ago
- Implementation of KangarooTwelve in Go☆94Jun 14, 2021Updated 4 years ago
- A list of publicly known but unfixed security bugs☆237Mar 9, 2018Updated 7 years ago
- Revectorization passes integrated into the LLVM compiler infrastructure☆29Feb 15, 2019Updated 7 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- ☆97Sep 28, 2017Updated 8 years ago