vusec / bhi-spectre-bhbLinks
This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability
☆118Updated 3 years ago
Alternatives and similar repositories for bhi-spectre-bhb
Users that are interested in bhi-spectre-bhb are comparing it to the libraries listed below
Sorting:
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆83Updated 2 years ago
- ☆112Updated 2 years ago
- Spectre based on Linear Address Masking☆67Updated last year
- ☆75Updated last year
- ☆90Updated 4 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆57Updated last week
- Proof-of-concept for the GhostWrite CPU bug.☆115Updated last year
- ☆42Updated 2 years ago
- ☆27Updated last year
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- ☆185Updated last year
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆61Updated 5 months ago
- Microarchitectural exploitation and other hardware attacks.☆95Updated last year
- ☆152Updated 6 months ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆153Updated last year
- ☆61Updated 8 months ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆144Updated 4 years ago
- Explore a live Linux kernel's memory using GDB☆117Updated 3 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆85Updated last week
- Binarly Vulnerability Research Advisories☆182Updated 3 weeks ago
- ☆102Updated 3 years ago
- ☆98Updated 2 years ago
- ☆168Updated 10 months ago
- Binary exploitation by confusing the unwinder☆66Updated 2 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆111Updated 2 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆61Updated 8 years ago
- A binary hardening system☆110Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆125Updated 10 months ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆39Updated last year