pietroborrello / RIDL-and-ZombieLoadView external linksLinks
Proof-of-concept for the ZombieLoad and RIDL attacks
☆29May 26, 2019Updated 6 years ago
Alternatives and similar repositories for RIDL-and-ZombieLoad
Users that are interested in RIDL-and-ZombieLoad are comparing it to the libraries listed below
Sorting:
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- ☆17Jun 26, 2025Updated 7 months ago
- ☆17Aug 25, 2022Updated 3 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆22Nov 23, 2023Updated 2 years ago
- 微信支付宝个人收款码管理平台☆10Jun 17, 2020Updated 5 years ago
- Lecture notes for Advanced Operating Systems and Virtualization course at Sapienza University of Rome☆22Mar 8, 2019Updated 6 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 8 years ago
- Port of the classic first-person-shooter DOOM to Xbox for DEFCON 27 CTF☆26Aug 20, 2019Updated 6 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- Tool for testing and finding minimal eviction sets☆107May 6, 2021Updated 4 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Website and PoC collection for transient execution attacks☆200Mar 9, 2024Updated last year
- RIDL test suite and exploits☆366Jun 9, 2020Updated 5 years ago
- Repeated access to L2-containable loops to look for snoop filter conflicts on Intel Skylake Xeon processors.☆29Aug 17, 2018Updated 7 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- ☆31Jun 18, 2020Updated 5 years ago
- Proof-of-concept for the ZombieLoad attack☆826Dec 24, 2021Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40May 13, 2019Updated 6 years ago
- CTF write-ups repository☆42Jul 8, 2023Updated 2 years ago
- A Thesis Class for the Chair of Software Engineering II at the University of Passau, Germany☆13Jun 14, 2025Updated 8 months ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- streamlink-cam4 lets you follow and archive your selected models shows on www.cam4.com☆12Sep 18, 2021Updated 4 years ago
- Crypto coin mixer☆10Feb 14, 2018Updated 8 years ago
- Python scripts for easy and anonymous cam4 recordings.☆10Mar 18, 2024Updated last year
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- C# .NET Attribute based command line argument parser☆13Dec 28, 2011Updated 14 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 3 months ago
- ☆10May 12, 2023Updated 2 years ago
- An Advanced Proxy Scraper With Features Like (Scrape Proxies From File, Gather Proxies From Sources, Check Proxies, And Use Custom Source…☆10Sep 5, 2017Updated 8 years ago
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 3 months ago
- Because sometimes you need to deal with byte structures in JS☆13Apr 11, 2016Updated 9 years ago
- A Java library that provides an easy way to obtain infos from Sapienza University's Infostud☆13Apr 14, 2023Updated 2 years ago
- 可能是全网最方便的水印图床,支持宝塔一键部署、也支持Docker版部署至服务器或本地电脑☆10Jul 16, 2019Updated 6 years ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- 苹果cms10源码☆11Apr 1, 2019Updated 6 years ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- ☆12Apr 1, 2025Updated 10 months ago