trailofbits / LeftoverLocalsRelease
The public release of LeftoverLocals code
☆65Updated last year
Alternatives and similar repositories for LeftoverLocalsRelease:
Users that are interested in LeftoverLocalsRelease are comparing it to the libraries listed below
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆60Updated 6 months ago
- ☆23Updated 2 years ago
- ☆69Updated 11 months ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆16Updated 7 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆48Updated 2 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆43Updated last month
- A MBR Fuzzer☆28Updated 10 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆61Updated 2 months ago
- Binary-only fuzzer for WebAssembly (WASI)☆48Updated 6 months ago
- ☆46Updated 2 years ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆59Updated 2 months ago
- QARMA block cipher in C☆26Updated 2 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆150Updated last year
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆57Updated 7 years ago
- Files used for reproducing Fuzzware's experiments☆55Updated last year
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆119Updated 8 months ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆11Updated this week
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆26Updated last week
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆20Updated last year
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆56Updated 3 years ago
- Binary exploitation by confusing the unwinder☆59Updated last year
- Simple rust fuzzer☆23Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆19Updated 5 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆30Updated 5 years ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated 11 months ago
- ☆59Updated 2 weeks ago
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- Coverage-Guided Greybox Distributed Fuzzer☆127Updated 6 months ago
- An IOKit kext designed for microarchitectural security research on M1☆32Updated 2 years ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆56Updated 2 months ago