Medusa Repository: Transynther tool and Medusa Attack
☆19Jul 14, 2020Updated 5 years ago
Alternatives and similar repositories for medusa
Users that are interested in medusa are comparing it to the libraries listed below
Sorting:
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆65Jun 4, 2025Updated 9 months ago
- Medusa Repository: Transynther tool and Medusa Attack☆23Jul 17, 2020Updated 5 years ago
- XML representation of the x86 instruction set☆29Feb 15, 2026Updated 2 weeks ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Aug 7, 2022Updated 3 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆40Dec 14, 2022Updated 3 years ago
- ☆45Jul 19, 2023Updated 2 years ago
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46May 19, 2023Updated 2 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- Website and PoC collection for transient execution attacks☆203Mar 9, 2024Updated last year
- Software artifacts for "UC-Check: Characterizing Micro-operation Caches in x86 Processors and Implications in Security and Performance" (…☆11Dec 27, 2021Updated 4 years ago
- A small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8.☆279Feb 25, 2026Updated last week
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- COATCheck☆13Nov 4, 2018Updated 7 years ago
- Revizor - Hardware fuzzing for the age of speculation☆179Updated this week
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.☆16Oct 8, 2024Updated last year
- Performance Counter Measurements at the cycle granularity☆18Jul 9, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Platypus Educational Samples☆23May 21, 2021Updated 4 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- RTLCheck☆25Oct 9, 2018Updated 7 years ago
- This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)☆31Oct 16, 2018Updated 7 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- Microarchitectural exploitation and other hardware attacks.☆96Mar 25, 2024Updated last year
- Proof-of-concept for the ZombieLoad and RIDL attacks☆29May 26, 2019Updated 6 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 6 years ago
- A script to check for common mistakes in LaTeX source files of scientific papers.☆35Aug 26, 2025Updated 6 months ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Feb 19, 2024Updated 2 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- ☆34Dec 14, 2025Updated 2 months ago
- VLESS-XTLS-uTLS-REALITY setup script.☆10May 3, 2023Updated 2 years ago
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago