Kernel Address Isolation to have Side-channels Efficiently Removed
☆223Dec 24, 2021Updated 4 years ago
Alternatives and similar repositories for KAISER
Users that are interested in KAISER are comparing it to the libraries listed below
Sorting:
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- ソーマ・カーネル・プロジェクト☆10Apr 12, 2017Updated 8 years ago
- Slides and very basic examples☆112May 17, 2017Updated 8 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Jan 5, 2019Updated 7 years ago
- ☆45Jul 19, 2023Updated 2 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373May 5, 2021Updated 4 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- ☆19Mar 24, 2017Updated 8 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- ☆11Mar 11, 2015Updated 10 years ago
- Pafish4vs is based on [Pafish]( https://github.com/a0rtega/pafish) , just ported to the VS (VC) compiler (X64 , X86) .☆12Aug 19, 2016Updated 9 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- ☆10Oct 30, 2016Updated 9 years ago
- This repository contains several tools to perform Cache Template Attacks☆165Nov 11, 2025Updated 3 months ago
- exploit development☆49Mar 14, 2018Updated 7 years ago
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago
- FairFuzz: AFL extension targeting rare branches☆252Feb 19, 2019Updated 7 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Jul 22, 2016Updated 9 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- ☆12May 8, 2017Updated 8 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Linux kASLR (Intel TSX/RTM) bypass static library☆80Oct 15, 2017Updated 8 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 9 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Dec 5, 2018Updated 7 years ago
- Part 2 of our Stack Based Buffer Overflow series. Building the ROP chain.☆13Jan 28, 2022Updated 4 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- ☆38Mar 20, 2017Updated 8 years ago