☆23Aug 5, 2025Updated 7 months ago
Alternatives and similar repositories for TLBSideChannel
Users that are interested in TLBSideChannel are comparing it to the libraries listed below
Sorting:
- ☆27Nov 30, 2024Updated last year
- PoC for CVE-2024-38399☆25Sep 25, 2025Updated 5 months ago
- ☆20Oct 24, 2024Updated last year
- ☆16Apr 6, 2023Updated 2 years ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆60Feb 20, 2026Updated last month
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- CLI spectral histograms of mic audio | Pitch / chord detection algorithms☆12Dec 8, 2024Updated last year
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆94Aug 25, 2024Updated last year
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆16Oct 8, 2024Updated last year
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- rust ctf writeups(Rust CTF解题报告)☆51Jan 4, 2022Updated 4 years ago
- Towards a million-node RISC-V cluster.☆14Mar 6, 2025Updated last year
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- algorithm for word square construction and the first proper English 10-square☆17May 13, 2023Updated 2 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- ☆107Aug 9, 2024Updated last year
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- pwn database☆18Jan 6, 2019Updated 7 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- This TG will define AP-TEE-IO ABI extensions to provide Confidential VM-assigned devices with secure direct access to confidential memory…☆14Updated this week
- ☆21Oct 22, 2025Updated 5 months ago
- Telegram Bot to flash and test PineTime firmware remotely☆25Nov 23, 2020Updated 5 years ago
- Here records some tips about pwn.☆12Mar 28, 2021Updated 4 years ago
- Set of tools to analyze Windows sandboxes for exposed attack surface. (Maintained V1 branch).☆18Nov 2, 2024Updated last year
- OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering☆51Sep 2, 2024Updated last year
- Generates Wireguard configuration files☆15Jul 26, 2022Updated 3 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- Nacos下Spring-Cloud-Gateway CVE-2022-22947利用环境☆16Jun 25, 2022Updated 3 years ago
- !exploitable Crash Analyzer - MSEC Debugger Extensions☆12Feb 16, 2021Updated 5 years ago
- ☆16Aug 19, 2024Updated last year
- 🦀 An example of how to package an actix-web project into a Docker container.☆19Jul 18, 2024Updated last year
- My public talks☆14Oct 1, 2024Updated last year
- ☆15Jun 21, 2023Updated 2 years ago
- DeJITLeak: Eliminating JIT-Induced Timing Side-Channel Leaks☆15Sep 15, 2022Updated 3 years ago
- A virtio layer for xv6☆12Apr 16, 2019Updated 6 years ago