marcan / speculation-bugsLinks
Docs and resources on CPU Speculative Execution bugs
☆375Updated 8 years ago
Alternatives and similar repositories for speculation-bugs
Users that are interested in speculation-bugs are comparing it to the libraries listed below
Sorting:
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆90Updated 4 years ago
- Linux i386 tool to load and execute ME modules.☆137Updated 4 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆73Updated last year
- ☆73Updated 5 years ago
- Kernel Test Framework☆150Updated 2 months ago
- IPC scripts for access to Intel CRBUS☆121Updated 4 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆223Updated 4 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆155Updated 2 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- GLM uCode dumps☆295Updated 5 years ago
- Notes on various topics I'm interested in☆161Updated 2 months ago
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆202Updated 4 years ago
- a friendly wrapper around ptrace☆134Updated 3 years ago
- Exploit generator for Intel ME 11 buffer overflow☆34Updated 6 years ago
- ☆174Updated 3 years ago
- Source code of the paper "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical"☆144Updated 4 years ago
- ☆118Updated 2 years ago
- ☆115Updated 12 years ago
- estimate peak virtual memory use☆18Updated 10 months ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆167Updated 9 years ago
- Example code for the AES crypto instructions on Intel chips☆84Updated 6 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Updated 3 years ago
- ☆78Updated 4 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 3 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆175Updated 6 years ago
- The code to the SGX-ROP paper☆185Updated 5 years ago
- TRRespass☆127Updated 4 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆355Updated 7 years ago
- A differential fuzzer for x86 decoders☆260Updated this week