marcan / speculation-bugsLinks
Docs and resources on CPU Speculative Execution bugs
☆376Updated 7 years ago
Alternatives and similar repositories for speculation-bugs
Users that are interested in speculation-bugs are comparing it to the libraries listed below
Sorting:
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆88Updated 4 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆70Updated last year
- Linux i386 tool to load and execute ME modules.☆136Updated 4 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- ☆71Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- Kernel Test Framework☆149Updated 9 months ago
- ☆113Updated 11 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆156Updated 2 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- a friendly wrapper around ptrace☆133Updated 3 years ago
- ☆172Updated 3 years ago
- Notes on various topics I'm interested in☆160Updated 10 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 9 years ago
- Example code for the AES crypto instructions on Intel chips☆84Updated 5 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆347Updated 7 years ago
- ☆114Updated 2 years ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 5 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- Information about Linux system calls on different architectures☆167Updated this week
- Simple Driver code for vmlaunch☆160Updated 8 years ago
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆201Updated 4 years ago
- ☆78Updated 4 years ago
- TRRespass☆125Updated 4 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆175Updated 5 years ago
- Transform vmlinuz into a fully debuggable vmlinux that can be used with /proc/kcore☆132Updated last year
- LKRG bypass methods☆73Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 3 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago