This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability
☆120Apr 12, 2022Updated 4 years ago
Alternatives and similar repositories for bhi-spectre-bhb
Users that are interested in bhi-spectre-bhb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆14Aug 17, 2023Updated 2 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆22May 23, 2020Updated 5 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Oct 13, 2022Updated 3 years ago
- Processor fuzzer targeting the Armv8-A ISA☆69Nov 28, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Arbitrary Speculative Code Execution with Return Instructions☆176Jan 23, 2024Updated 2 years ago
- ☆74Mar 11, 2024Updated 2 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Dec 14, 2022Updated 3 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆23Jun 11, 2021Updated 4 years ago
- The open-source component of Prime+Scope, published at CCS 2021☆38Jul 18, 2023Updated 2 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆25Jul 17, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆86Nov 10, 2025Updated 6 months ago
- Website and PoC collection for transient execution attacks☆204Mar 9, 2024Updated 2 years ago
- Revizor - Hardware fuzzing for the age of speculation☆182Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Spectre based on Linear Address Masking☆66Dec 4, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆65Aug 12, 2024Updated last year
- ☆15Sep 26, 2021Updated 4 years ago
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆34Feb 13, 2026Updated 3 months ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆46Aug 25, 2021Updated 4 years ago
- ☆31Feb 20, 2024Updated 2 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆61May 8, 2024Updated 2 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- ☆30Feb 20, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Materials from the DEF CON 30 talk on PACMAN☆35Oct 28, 2022Updated 3 years ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆34Jul 2, 2025Updated 10 months ago
- RIDL test suite and exploits☆364Jun 9, 2020Updated 5 years ago
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆16Oct 17, 2022Updated 3 years ago
- ☆44Jul 19, 2023Updated 2 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Dec 28, 2021Updated 4 years ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆17Jun 7, 2021Updated 4 years ago
- Tool for testing and finding minimal eviction sets☆106May 6, 2021Updated 5 years ago
- ☆18Nov 19, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Medusa Repository: Transynther tool and Medusa Attack☆19Jul 14, 2020Updated 5 years ago
- The code in this project demonstrates 2 novel Spectre-V4 attacks, named as out-of-place Spectre-STL and Spectre-CTL, based on the Specula…☆22Nov 23, 2023Updated 2 years ago
- Fine-grained frequency and voltage transition tests☆25Jun 11, 2023Updated 2 years ago
- Software artifacts for "UC-Check: Characterizing Micro-operation Caches in x86 Processors and Implications in Security and Performance" (…☆10Dec 27, 2021Updated 4 years ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆40Feb 19, 2024Updated 2 years ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆59Feb 20, 2026Updated 2 months ago
- Understand and mitigate software-observable side-channels☆507Jan 6, 2021Updated 5 years ago