trailofbits / sixtyfour
How fast can we brute force a 64-bit comparison?
☆52Updated 5 years ago
Alternatives and similar repositories for sixtyfour:
Users that are interested in sixtyfour are comparing it to the libraries listed below
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Updated 4 years ago
- A div-less, mul-less, atomic-less `rv64i` compiler toolchain using purely clang, musl, and compiler-rt☆30Updated 5 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Updated 10 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Apparently this maybe blogs or something?☆16Updated 9 months ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Linux i386 tool to load and execute ME modules.☆132Updated 4 years ago
- ARM is Turing-complete without data fetches☆56Updated 7 years ago
- ☆77Updated 3 years ago
- estimate peak virtual memory use☆18Updated last month
- A fairly quick data structure for matching a string against a large list of patterns.☆35Updated last year
- Trace a program using CPU tracer technology.☆27Updated 2 years ago
- rune - radare2 based symbolic emulator☆26Updated 7 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Lower Size Bounds for Sorting Networks☆44Updated 4 years ago
- poststructural fuzzing☆31Updated 5 years ago
- DEPRECATED — Containerized Cloud Fuzzing☆27Updated 6 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- A tweakable block cipher☆31Updated 11 months ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆87Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- ☆19Updated 4 years ago
- Docs and resources on CPU Speculative Execution bugs☆374Updated 7 years ago
- Fuzzer to automatically find side-channel (timing) vulnerabilities☆117Updated 3 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated last week
- a friendly wrapper around ptrace☆131Updated 3 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- Automatic inference of a formal specification of the x86_64 instruction set☆69Updated 9 years ago