This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability
☆121Apr 12, 2022Updated 3 years ago
Alternatives and similar repositories for bhi-spectre-bhb
Users that are interested in bhi-spectre-bhb are comparing it to the libraries listed below
Sorting:
- ☆75Mar 11, 2024Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆175Jan 23, 2024Updated 2 years ago
- Processor fuzzer targeting the Armv8-A ISA☆67Nov 28, 2022Updated 3 years ago
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆14Aug 17, 2023Updated 2 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆23May 23, 2020Updated 5 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆25Jun 11, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆82Nov 10, 2025Updated 3 months ago
- Website and PoC collection for transient execution attacks☆204Mar 9, 2024Updated 2 years ago
- Revizor - Hardware fuzzing for the age of speculation☆179Updated this week
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Dec 28, 2021Updated 4 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆40Dec 14, 2022Updated 3 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- ☆27Nov 30, 2024Updated last year
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆33Feb 13, 2026Updated 3 weeks ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆23Jul 17, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆65Aug 12, 2024Updated last year
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆59May 8, 2024Updated last year
- I updated the exploit code by Project Zero to gain root shell on iOS devices that I own. Deleted the previous repo and pushing in new one…☆13Dec 18, 2016Updated 9 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- Software artifacts for "UC-Check: Characterizing Micro-operation Caches in x86 Processors and Implications in Security and Performance" (…☆11Dec 27, 2021Updated 4 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆41Feb 19, 2024Updated 2 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- ☆73Nov 19, 2022Updated 3 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆32Jul 2, 2025Updated 8 months ago
- ☆30Feb 20, 2024Updated 2 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆24Jun 29, 2019Updated 6 years ago
- Materials from the DEF CON 30 talk on PACMAN☆34Oct 28, 2022Updated 3 years ago
- CVE-2022-24122 Proof of Concept☆13Mar 15, 2022Updated 3 years ago
- RIDL test suite and exploits☆366Jun 9, 2020Updated 5 years ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆60Feb 20, 2026Updated 2 weeks ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Microarchitectural exploitation and other hardware attacks.☆96Mar 25, 2024Updated last year
- ☆45Jul 19, 2023Updated 2 years ago