isec-tugraz / armageddon
This repository contains tools to perform modern cache attacks on ARM.
☆288Updated 3 years ago
Alternatives and similar repositories for armageddon:
Users that are interested in armageddon are comparing it to the libraries listed below
- This repository contains examples of Flush+Flush cache attacks☆159Updated 3 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆178Updated 7 years ago
- ☆148Updated 6 years ago
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- This repository contains several tools to perform Cache Template Attacks☆146Updated last year
- ☆186Updated 9 months ago
- Reverse Engineering Page Table Caches in Your Processor☆368Updated 3 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆243Updated 5 years ago
- Microcode parser for AMD, Intel, and VIA processors☆133Updated 9 years ago
- AFL/QEMU fuzzing with full-system emulation.☆629Updated 6 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆217Updated 3 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆315Updated 4 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- This repository contains the nested kernel implementation as it was built for the ASPLOS 2015 paper, including the FreeBSD prototype Pers…☆55Updated 7 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆60Updated 7 years ago
- An amd64 symbolic emulator☆314Updated 3 years ago
- Notes on various topics I'm interested in☆158Updated 9 years ago
- A linux system call fuzzer using TriforceAFL☆174Updated last year
- ☆160Updated 7 years ago
- Tools for "Another Flip in the Wall"☆38Updated 6 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- A static binary rewriter that does not use heuristics☆303Updated 6 years ago
- yet another tool for analysing binaries☆476Updated last month
- An easy to use tool to stream hardware performance counters data as CSV☆28Updated 10 months ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆155Updated 7 years ago
- The code to the SGX-ROP paper☆183Updated 4 years ago
- ☆173Updated 2 years ago
- ☆159Updated 10 years ago
- add symbols back into a stripped ELF binary (~strip)☆170Updated 7 years ago