Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript
☆522Jun 15, 2025Updated 8 months ago
Alternatives and similar repositories for rowhammerjs
Users that are interested in rowhammerjs are comparing it to the libraries listed below
Sorting:
- Test DRAM for bit flips caused by the rowhammer problem☆994Sep 2, 2015Updated 10 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- ☆153Oct 18, 2018Updated 7 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆194Aug 23, 2017Updated 8 years ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- ☆19Jun 20, 2020Updated 5 years ago
- Source code for testing the Row Hammer error mechanism in DRAM devices. Described in the ISCA 2014 paper by Kim et al. at http://users.ec…☆234Sep 2, 2015Updated 10 years ago
- ☆48Nov 4, 2022Updated 3 years ago
- This repository contains several tools to perform Cache Template Attacks☆165Nov 11, 2025Updated 3 months ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- TRRespass☆127May 5, 2021Updated 4 years ago
- Native binary for testing Android phones for the Rowhammer bug☆490Jun 27, 2018Updated 7 years ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆248Jan 27, 2024Updated 2 years ago
- Architectural privilege escalation on x86☆855Mar 22, 2018Updated 7 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆37Jan 11, 2024Updated 2 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆223Dec 24, 2021Updated 4 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆285Dec 24, 2021Updated 4 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,601Jun 13, 2025Updated 8 months ago
- Tool for testing and finding minimal eviction sets☆108May 6, 2021Updated 4 years ago
- Proof-of-concept for the ZombieLoad attack☆828Dec 24, 2021Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆13Jun 22, 2019Updated 6 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Jul 5, 2015Updated 10 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- ☆236May 31, 2018Updated 7 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- My UEFI security talk on ZeroNights 2015☆58Dec 13, 2015Updated 10 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ☆470Nov 20, 2024Updated last year
- ☆92Aug 18, 2024Updated last year