tbodt / spectreLinks
Spectre POC: Reading from another process
☆36Updated 6 years ago
Alternatives and similar repositories for spectre
Users that are interested in spectre are comparing it to the libraries listed below
Sorting:
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- A quick PoC to try out the "meltdown" timing attack.☆155Updated 7 years ago
- Docs and resources on CPU Speculative Execution bugs☆377Updated 7 years ago
- a friendly wrapper around ptrace☆133Updated 3 years ago
- Dynamic binary translation framework for instrumenting the Linux kernel and its modules☆77Updated 7 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- RuCTF 2016 repository☆16Updated 5 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 3 years ago
- Research on WebAssembly☆41Updated 3 years ago
- An ELF parsing and manipulation library for Python☆74Updated 10 years ago
- ☆92Updated 6 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 6 years ago
- ☆24Updated 4 years ago
- Some RSA attacks with sage☆11Updated 8 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- retools: a reverse engineering toolkit for normies☆86Updated 7 years ago
- A browser based GUI for **LLDB** Debugger.☆199Updated 4 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆80Updated 6 years ago
- DARPA Cyber Grand Challenge OS syscall library☆18Updated 8 years ago
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆73Updated 6 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆88Updated 3 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆45Updated 6 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆35Updated 8 years ago
- Official archive of https://code.google.com/p/cryptospecs/☆76Updated 6 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago