nccgroup / cachegrabLinks
a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 cores
☆80Updated 6 years ago
Alternatives and similar repositories for cachegrab
Users that are interested in cachegrab are comparing it to the libraries listed below
Sorting:
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- Fuzzing utility which enables sending arbitrary SCMs to TrustZone☆61Updated 9 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆163Updated 3 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- Linux Kernel Source Tree Reducer☆81Updated 11 months ago
- Differential Address Trace Analysis☆58Updated last year
- Traditional Mitigation in GCC to defend Memory Corruption Vulnerability☆21Updated 4 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆245Updated 7 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆56Updated 5 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Hexag00n: A collection of reverse engineering tools for the Qualcomm Digital Signal Proccesor (QDSP6)☆114Updated 8 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- ☆35Updated 2 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Updated 2 years ago
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆84Updated 11 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆37Updated 10 years ago
- Emulating Exynos 4210 BootROM in QEMU☆74Updated 5 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆151Updated 7 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆167Updated 9 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆41Updated 7 years ago
- ☆149Updated 6 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago