☆79Mar 11, 2026Updated last week
Alternatives and similar repositories for gpuhammer
Users that are interested in gpuhammer are comparing it to the libraries listed below
Sorting:
- Artifacts for "Phoenix: Rowhammer Attacks on DDR5 with Self-Correcting Synchronization" (IEEE S&P '26)☆61Sep 17, 2025Updated 6 months ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- ☆20Oct 24, 2024Updated last year
- ☆15Sep 17, 2024Updated last year
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated last year
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆194Aug 23, 2017Updated 8 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).☆249Jan 27, 2024Updated 2 years ago
- ☆23Jan 28, 2025Updated last year
- ☆16Oct 18, 2024Updated last year
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆60Feb 20, 2026Updated last month
- Quick & Flexible Rack-Scale Computer Architecture Simulator☆53Mar 5, 2026Updated 2 weeks ago
- ☆64Mar 5, 2026Updated 2 weeks ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆32Jul 2, 2025Updated 8 months ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- A dynamic binary instrumentation tool for tracing and analyzing CUDA kernel instructions.☆35Mar 12, 2026Updated last week
- ☆77Apr 18, 2025Updated 11 months ago
- ☆76Mar 7, 2026Updated last week
- ☆25Mar 26, 2025Updated 11 months ago
- Source code for the DEF CON 32 CTF Qualifiers.☆75May 24, 2024Updated last year
- Cryptonita - cryptanalysis swiss army knife☆14Jan 24, 2026Updated last month
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆21Nov 1, 2025Updated 4 months ago
- ☆14Dec 26, 2022Updated 3 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- ☆17Mar 8, 2024Updated 2 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- This is the open-source version of TinyTS. The code is dirty so far. We may clean the code in the future.☆20Aug 11, 2025Updated 7 months ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- ☆11Jun 10, 2024Updated last year
- This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear…☆22Jan 26, 2025Updated last year
- BlastGraph is a new tool for computing intensive approximate pattern matching in a sequence graph or a de-Bruijn graph. Given an oriented…☆12May 9, 2013Updated 12 years ago
- Tool for testing and finding minimal eviction sets☆108May 6, 2021Updated 4 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- Shor's algorithm simulation using CUDA☆19Nov 10, 2019Updated 6 years ago
- ☆48Nov 4, 2022Updated 3 years ago
- User Space NVMe Driver (modified for use on Zynq UltraScale+ MPSoC)☆11Sep 26, 2018Updated 7 years ago
- micro editor plugin that provides zig fmt integration☆15Jul 1, 2022Updated 3 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago