marcan / speculation-bugsLinks
Docs and resources on CPU Speculative Execution bugs
☆377Updated 7 years ago
Alternatives and similar repositories for speculation-bugs
Users that are interested in speculation-bugs are comparing it to the libraries listed below
Sorting:
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆88Updated 3 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- Linux i386 tool to load and execute ME modules.☆134Updated 4 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- ☆70Updated 5 years ago
- Kernel Test Framework☆145Updated 7 months ago
- Rewriting functions in compiled binaries using McSema☆90Updated 6 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆155Updated 2 years ago
- ☆114Updated 2 years ago
- ☆172Updated 3 years ago
- ☆78Updated 4 years ago
- a friendly wrapper around ptrace☆133Updated 3 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆347Updated 6 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆169Updated last year
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 3 years ago
- Example code for the AES crypto instructions on Intel chips☆83Updated 5 years ago
- ☆113Updated 11 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- estimate peak virtual memory use☆18Updated 5 months ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Kernel-based debugger for Linux applications☆74Updated 3 years ago
- GLM uCode dumps☆290Updated 5 years ago
- TRRespass☆125Updated 4 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆143Updated 4 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- Notes on various topics I'm interested in☆160Updated 10 years ago