Proof-of-concept for the ZombieLoad and RIDL attacks
☆29May 26, 2019Updated 6 years ago
Alternatives and similar repositories for RIDL-and-ZombieLoad
Users that are interested in RIDL-and-ZombieLoad are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆47Jul 19, 2023Updated 2 years ago
- ☆17Jun 26, 2025Updated 9 months ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- ☆17Jun 25, 2017Updated 8 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repository contains tools to perform modern cache attacks on ARM.☆295Dec 24, 2021Updated 4 years ago
- ☆47Dec 19, 2018Updated 7 years ago
- Repository of the paper "Reproducing Spectre Attack with gem5, How To Do It Right?"☆18Jul 27, 2023Updated 2 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 9 years ago
- ☆31Jun 18, 2020Updated 5 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Port of the classic first-person-shooter DOOM to Xbox for DEFCON 27 CTF☆26Aug 20, 2019Updated 6 years ago
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆21Nov 23, 2023Updated 2 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Website and PoC collection for transient execution attacks☆203Mar 9, 2024Updated 2 years ago
- ☆12May 2, 2017Updated 8 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- An easy to use tool to stream hardware performance counters data as CSV☆31May 7, 2024Updated last year
- Proof-of-concept for the ZombieLoad attack☆828Dec 24, 2021Updated 4 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆91Oct 19, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- plugin for storing and using snippets of useful Binja script☆29Jan 11, 2026Updated 2 months ago
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- ☆13Jun 22, 2019Updated 6 years ago
- Repeated access to L2-containable loops to look for snoop filter conflicts on Intel Skylake Xeon processors.☆29Aug 17, 2018Updated 7 years ago
- This repository contains several tools to perform Cache Template Attacks☆165Nov 11, 2025Updated 4 months ago
- Multi-platform topology-aware memory management library☆13Apr 23, 2020Updated 5 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- A practical attack framework for precise enclave execution control☆472Mar 23, 2026Updated last week
- ☆11Aug 23, 2023Updated 2 years ago
- ☆10May 12, 2023Updated 2 years ago
- ☆21May 31, 2024Updated last year
- IDA Python's idc.py <= 7.3 compatibility module☆21Oct 11, 2019Updated 6 years ago