toddmaustin / kevlarLinks
KEVLAR memory defenses.
☆17Updated 9 months ago
Alternatives and similar repositories for kevlar
Users that are interested in kevlar are comparing it to the libraries listed below
Sorting:
- Proof-of-concept for the GhostWrite CPU bug.☆116Updated last year
- The public release of LeftoverLocals code☆70Updated last year
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated 3 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 6 months ago
- ☆35Updated 10 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Updated last year
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Updated last year
- ☆22Updated 5 months ago
- Microarchitectural exploitation and other hardware attacks.☆95Updated last year
- Toolkit for creating cryptographic figures and videos.☆35Updated last year
- CTF Challenge for CSAW Finals 2021☆12Updated 4 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- This is a guide to removing PDF watermarks. It contains the lessons learned from an experiment of mine.☆14Updated last year
- List of crackpot 'scientists' and 'thinkers'☆20Updated 5 months ago
- ☆33Updated 10 months ago
- Example of an ELF parser to learn about the ELF format☆10Updated last year
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Updated 10 months ago
- Unicorn: Symbolic Execution, Bounded Model Checking, and Code Optimization of RISC-V Code using Classical Solvers and Quantum Computers☆37Updated 3 weeks ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆49Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- Alphanumeric+1 shellcoding tools for RISC-V☆37Updated 6 years ago
- Spectre based on Linear Address Masking☆67Updated 2 years ago
- ☆11Updated 3 years ago
- BINARLY Research Tools and PoCs☆39Updated last year
- Minimal setup to trigger the xz backdoor☆29Updated last year
- ☆61Updated 9 months ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆34Updated last month
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 3 years ago
- ☆31Updated 2 years ago
- ☆12Updated last year