toddmaustin / kevlarLinks
KEVLAR memory defenses.
☆17Updated 6 months ago
Alternatives and similar repositories for kevlar
Users that are interested in kevlar are comparing it to the libraries listed below
Sorting:
- The public release of LeftoverLocals code☆68Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆116Updated last year
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated last week
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆63Updated last year
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆20Updated last year
- ☆29Updated 8 months ago
- Spectre V1 Proof-of-Concept Attack in the Rust Language☆24Updated 5 months ago
- Microarchitectural exploitation and other hardware attacks.☆96Updated last year
- NVidia sass disassembler/inline patcher☆28Updated this week
- BINARLY Research Tools and PoCs☆37Updated last year
- ☆17Updated 2 years ago
- FPGA design and test files for ChipWhisperer-Husky.☆17Updated last week
- ☆64Updated 3 weeks ago
- Toolkit for creating cryptographic figures and videos.☆33Updated last year
- Side-channel traces visualizer☆16Updated 4 months ago
- Example of an ELF parser to learn about the ELF format☆10Updated 11 months ago
- List of crackpot 'scientists' and 'thinkers'☆20Updated 3 months ago
- QARMA block cipher in C☆30Updated 3 years ago
- embedded-systems-security-examples☆25Updated 3 years ago
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆46Updated last year
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆51Updated 4 months ago
- This is a guide to removing PDF watermarks. It contains the lessons learned from an experiment of mine.☆11Updated 11 months ago
- Spectre based on Linear Address Masking☆69Updated last year
- ☆60Updated 6 months ago
- CTF Challenge for CSAW Finals 2021☆12Updated 3 years ago
- iTLB multihit PoC☆42Updated last year
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆32Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 9 months ago
- ☆33Updated 7 months ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year