trailofbits / LeftoverLocalsRelease
The public release of LeftoverLocals code
☆66Updated last year
Alternatives and similar repositories for LeftoverLocalsRelease
Users that are interested in LeftoverLocalsRelease are comparing it to the libraries listed below
Sorting:
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆69Updated 2 weeks ago
- Binary-only fuzzer for WebAssembly (WASI)☆49Updated 9 months ago
- breaking decompilers☆17Updated last week
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated 3 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆52Updated last month
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆31Updated 2 weeks ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆16Updated 10 months ago
- ☆73Updated last year
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago
- A tool to perform so called BGE attack☆24Updated last year
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆73Updated 2 years ago
- ☆23Updated 2 years ago
- ☆26Updated 3 months ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆62Updated 9 months ago
- An IOKit kext designed for microarchitectural security research on M1☆42Updated 2 years ago
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆32Updated last year
- asnfuzzgen - ASN.1 Structure-Aware Fuzzing Compiler☆42Updated 8 months ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆89Updated 3 months ago
- ☆40Updated 3 weeks ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆42Updated 2 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆24Updated last year
- Files used for reproducing Fuzzware's experiments☆57Updated 2 years ago
- QARMA block cipher in C☆30Updated 2 years ago
- Simple rust fuzzer☆23Updated 4 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- Practical Data-Only Attack Generation☆39Updated 11 months ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago