Patch your macOS kernel to enable support for the high-resolution timers on M1
☆43May 8, 2025Updated 10 months ago
Alternatives and similar repositories for PacmanPatcher
Users that are interested in PacmanPatcher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- M1 bare metal project in Rust☆32Sep 1, 2022Updated 3 years ago
- An IOKit kext designed for microarchitectural security research on M1☆46Oct 30, 2022Updated 3 years ago
- ☆12Sep 12, 2025Updated 6 months ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆49Aug 12, 2022Updated 3 years ago
- This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear…☆22Jan 26, 2025Updated last year
- ☆12Apr 1, 2025Updated 11 months ago
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆21Nov 23, 2023Updated 2 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆40Feb 19, 2024Updated 2 years ago
- This repository provides Pensieve, a security evaluation framework for microarchitectural defenses against speculative execution attacks.☆24Jan 17, 2024Updated 2 years ago
- Proof-of-concept for the paper "StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s …☆93Jan 30, 2026Updated last month
- Materials from the DEF CON 30 talk on PACMAN☆34Oct 28, 2022Updated 3 years ago
- macOS kext with kernel R/W, kalloc and kcall☆108Jun 21, 2025Updated 9 months ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Artifact for the IEEE S&P 2025 paper: "Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage"☆21Nov 25, 2025Updated 3 months ago
- ☆20Nov 27, 2023Updated 2 years ago
- Performance Counter Measurements at the cycle granularity☆19Jul 9, 2021Updated 4 years ago
- Online cipher decryption puzzles☆15Oct 11, 2014Updated 11 years ago
- Dump Apple PMU counter definitions from `/usr/share/kpep` in macOS☆16Mar 6, 2026Updated 2 weeks ago
- A tool for checking the contract satisfaction for hardware designs☆12Nov 4, 2025Updated 4 months ago
- ☆36Feb 3, 2025Updated last year
- Random experiments and shenanigans☆13Dec 6, 2025Updated 3 months ago
- Simple Kernel Extension to read and write Kernel Memory☆15Aug 18, 2022Updated 3 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆32Jul 2, 2025Updated 8 months ago
- A tool to manage your wallets☆16Aug 25, 2021Updated 4 years ago
- Implementation for the DIMVA'22 paper "Branch Different - Spectre Attacks on Apple Silicon"☆39Jul 29, 2022Updated 3 years ago
- ⚖️ Zugang zu Recht - Access to Justice - A2J ⚖️☆13Updated this week
- tvOS mostly complete headers for 13.0☆10Nov 5, 2019Updated 6 years ago
- Summary of bugs in Xuantie C9XX core design. include C906/C908/C910/C920☆29Feb 10, 2026Updated last month
- ☆15Oct 27, 2022Updated 3 years ago
- Grant private entitlements to OSX apps☆120Sep 13, 2020Updated 5 years ago
- library to load and parse Mach-O core files without dependencies☆17Oct 4, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Code of KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations (USENIX Security'23)☆92Aug 31, 2023Updated 2 years ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆39Sep 6, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆272Jun 21, 2024Updated last year
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- Open sourced implementation of a prototype for Hyperledger Fabric chaincode execution with OP-TEE. This work is part of the master thesis…☆14Sep 10, 2019Updated 6 years ago