some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.
☆15Aug 30, 2019Updated 6 years ago
Alternatives and similar repositories for tlbkit
Users that are interested in tlbkit are comparing it to the libraries listed below
Sorting:
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Jul 19, 2021Updated 4 years ago
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Oct 31, 2022Updated 3 years ago
- Code for ReF Decompile: Relabeling and Function Call Enhanced Decompile☆26Dec 7, 2025Updated 2 months ago
- ☆18Sep 4, 2023Updated 2 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆26Feb 9, 2023Updated 3 years ago
- ☆27Mar 16, 2023Updated 2 years ago
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Aug 7, 2022Updated 3 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- A System Level RISCV32 Emulator Over x86_64: capable of booting RISCV Linux☆28Aug 3, 2021Updated 4 years ago
- Python bindings for BochsCPU☆38Aug 10, 2025Updated 6 months ago
- binary ninja related code☆37Mar 27, 2025Updated 11 months ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 6 years ago
- A coverage-based software testing tool☆34Dec 11, 2020Updated 5 years ago
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆37Jan 11, 2024Updated 2 years ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- headless-ida-mcp-server☆30Apr 4, 2025Updated 10 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Updated this week
- ☆10Nov 14, 2022Updated 3 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Mar 30, 2020Updated 5 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆39Apr 3, 2020Updated 5 years ago
- Corpus set used by DIE☆41May 20, 2020Updated 5 years ago