☆97Mar 11, 2026Updated 2 months ago
Alternatives and similar repositories for gpuhammer
Users that are interested in gpuhammer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆41May 5, 2026Updated 2 weeks ago
- ☆13Sep 12, 2025Updated 8 months ago
- Luthier, a GPU binary instrumentation tool for AMD GPUs☆28May 13, 2026Updated last week
- FlippyRAM is an automated framework for testing and analyzing Rowhammer vulnerabilities in DRAM. It combines rowhammer tools and supports…☆25Oct 30, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Oct 18, 2024Updated last year
- ☆14Apr 1, 2025Updated last year
- MICRO 2024 Evaluation Artifact for FuseMax☆17Aug 26, 2024Updated last year
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆15Dec 13, 2023Updated 2 years ago
- OpenHCL Linux Kernel☆21May 11, 2026Updated last week
- Vulnerabilities advisories and PoC☆18May 8, 2026Updated last week
- Implementation for the DIMVA'22 paper "Branch Different - Spectre Attacks on Apple Silicon"☆40Jul 29, 2022Updated 3 years ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆60Jun 19, 2025Updated 11 months ago
- ☆80Apr 18, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Confidential Computing-Aware Certificate Authority☆13Apr 10, 2026Updated last month
- Proof-of-concept for the paper "StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s …☆98Jan 30, 2026Updated 3 months ago
- ☆16Jul 3, 2025Updated 10 months ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆65Aug 12, 2024Updated last year
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- ☆13Dec 26, 2022Updated 3 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 4 years ago
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆23Nov 1, 2025Updated 6 months ago
- ☆11Jul 27, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A dynamic binary instrumentation tool for tracing and analyzing CUDA kernel instructions.☆66May 8, 2026Updated last week
- CROSSCON-Hypervisor, a Lightweight Hypervisor☆22May 4, 2026Updated 2 weeks ago
- ☆11Jun 10, 2024Updated last year
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- ☆15Apr 18, 2024Updated 2 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated last year
- LLTFI is a tool, which is an extension of LLFI, allowing users to run fault injection experiments on C/C++, TensorFlow and PyTorch applic…☆42Updated this week
- This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear…☆25Jan 26, 2025Updated last year
- x86 and x64 assembly "read-eval-print loop" for Windows☆36Aug 13, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 数据隐写:将数据嵌入到到 BMP 数据中☆11Oct 28, 2020Updated 5 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 8 years ago
- ☆31Jun 7, 2023Updated 2 years ago
- Unified modular arceos-hypervisor☆43Apr 8, 2026Updated last month
- ☆11Aug 23, 2023Updated 2 years ago
- Virtual Machine Introspection (VMI) for memory forensics and machine-learning.☆29Jun 2, 2025Updated 11 months ago
- This is a authority management project.☆10Dec 18, 2020Updated 5 years ago