marcan / speculation-bugs
Docs and resources on CPU Speculative Execution bugs
☆373Updated 7 years ago
Alternatives and similar repositories for speculation-bugs:
Users that are interested in speculation-bugs are comparing it to the libraries listed below
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆65Updated 11 months ago
- Linux i386 tool to load and execute ME modules.☆130Updated 4 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆86Updated 3 years ago
- Kernel Test Framework☆140Updated last month
- ☆70Updated 4 years ago
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆215Updated 3 years ago
- ☆113Updated last year
- Notes on various topics I'm interested in☆157Updated 9 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆157Updated last year
- Routines for hunting down kernel symbols.☆82Updated 13 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Rewriting functions in compiled binaries using McSema☆88Updated 5 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆334Updated 6 years ago
- ☆77Updated 3 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- ☆173Updated 2 years ago
- Linux kernel - See Landlock issues☆36Updated 2 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆90Updated 10 months ago
- Example code for the AES crypto instructions on Intel chips☆82Updated 5 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆139Updated 3 years ago
- ☆36Updated 3 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Fork of KVM with Virtual Machine Introspection patches☆35Updated last year
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆133Updated 6 years ago
- Summary of the patch status for Meltdown / Spectre☆348Updated 7 years ago
- uber eXtensible Micro-Hypervisor Framework☆31Updated 8 months ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago