Proof-of-concept for the ZombieLoad and RIDL attacks
☆29May 26, 2019Updated 6 years ago
Alternatives and similar repositories for RIDL-and-ZombieLoad
Users that are interested in RIDL-and-ZombieLoad are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- ☆44Jul 19, 2023Updated 2 years ago
- ☆17Jun 26, 2025Updated 9 months ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆17Aug 25, 2022Updated 3 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆19Jul 14, 2020Updated 5 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- RIDL test suite and exploits☆365Jun 9, 2020Updated 5 years ago
- ☆47Dec 19, 2018Updated 7 years ago
- Tool for testing and finding minimal eviction sets☆106May 6, 2021Updated 4 years ago
- Repository of the paper "Reproducing Spectre Attack with gem5, How To Do It Right?"☆18Jul 27, 2023Updated 2 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 9 years ago
- ☆31Jun 18, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Port of the classic first-person-shooter DOOM to Xbox for DEFCON 27 CTF☆26Aug 20, 2019Updated 6 years ago
- Lecture notes for Advanced Operating Systems and Virtualization course at Sapienza University of Rome☆22Mar 8, 2019Updated 7 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Website and PoC collection for transient execution attacks☆203Mar 9, 2024Updated 2 years ago
- ☆12May 2, 2017Updated 8 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- An easy to use tool to stream hardware performance counters data as CSV☆31May 7, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Proof-of-concept for the ZombieLoad attack☆828Dec 24, 2021Updated 4 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆196Aug 23, 2017Updated 8 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆91Oct 19, 2021Updated 4 years ago
- plugin for storing and using snippets of useful Binja script☆29Jan 11, 2026Updated 3 months ago
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- ☆14Jun 22, 2019Updated 6 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Nov 11, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Multi-platform topology-aware memory management library☆13Apr 23, 2020Updated 5 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆28Feb 3, 2021Updated 5 years ago
- A practical attack framework for precise enclave execution control☆473Apr 9, 2026Updated last week
- ☆11Aug 23, 2023Updated 2 years ago
- ☆21May 31, 2024Updated last year
- IDA Python's idc.py <= 7.3 compatibility module☆21Oct 11, 2019Updated 6 years ago