marcan / speculation-bugsLinks
Docs and resources on CPU Speculative Execution bugs
☆376Updated 7 years ago
Alternatives and similar repositories for speculation-bugs
Users that are interested in speculation-bugs are comparing it to the libraries listed below
Sorting:
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆90Updated 4 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆70Updated last year
- Scout - Instruction based research debugger (a poor man's debugger)☆156Updated 2 years ago
- Linux i386 tool to load and execute ME modules.☆136Updated 4 years ago
- Kernel Test Framework☆149Updated 2 weeks ago
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆222Updated 3 years ago
- ☆71Updated 5 years ago
- ☆173Updated 3 years ago
- a friendly wrapper around ptrace☆134Updated 3 years ago
- IPC scripts for access to Intel CRBUS☆120Updated 4 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- Notes on various topics I'm interested in☆160Updated 3 weeks ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 9 years ago
- ☆116Updated 2 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆76Updated 3 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆350Updated 7 years ago
- TRRespass☆125Updated 4 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆76Updated 6 years ago
- ☆113Updated 11 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 2 years ago
- ☆78Updated 4 years ago
- Unlinks a binary executable to get back a set of .o object files for further transformation and re-linking.☆161Updated 3 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆175Updated 5 years ago
- Processor fuzzer targeting the Armv8-A ISA☆66Updated 3 years ago
- LKRG bypass methods☆73Updated 5 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- Routines for hunting down kernel symbols.☆83Updated 14 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 7 years ago
- GLM uCode dumps☆294Updated 5 years ago