vusec / bhi-spectre-bhbView external linksLinks
This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability
☆121Apr 12, 2022Updated 3 years ago
Alternatives and similar repositories for bhi-spectre-bhb
Users that are interested in bhi-spectre-bhb are comparing it to the libraries listed below
Sorting:
- ☆75Mar 11, 2024Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆176Jan 23, 2024Updated 2 years ago
- Processor fuzzer targeting the Armv8-A ISA☆67Nov 28, 2022Updated 3 years ago
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆14Aug 17, 2023Updated 2 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆22May 23, 2020Updated 5 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆25Jun 11, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆80Nov 10, 2025Updated 3 months ago
- Website and PoC collection for transient execution attacks☆200Mar 9, 2024Updated last year
- Revizor - Hardware fuzzing for the age of speculation☆180Jan 22, 2026Updated 3 weeks ago
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆76Dec 28, 2021Updated 4 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Dec 14, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- ☆31Feb 20, 2022Updated 3 years ago
- ☆27Nov 30, 2024Updated last year
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆34Mar 28, 2025Updated 10 months ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆23Jul 17, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "CacheWarp: Software-based Fault Injection using Selective State Reset" (USENIX Security 20…☆65Aug 12, 2024Updated last year
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58May 8, 2024Updated last year
- Software artifacts for "UC-Check: Characterizing Micro-operation Caches in x86 Processors and Implications in Security and Performance" (…☆11Dec 27, 2021Updated 4 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- I updated the exploit code by Project Zero to gain root shell on iOS devices that I own. Deleted the previous repo and pushing in new one…