KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling
☆36Feb 28, 2020Updated 6 years ago
Alternatives and similar repositories for kleespectre
Users that are interested in kleespectre are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆18Oct 19, 2023Updated 2 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- use afl to fuzz swift program☆24Nov 3, 2017Updated 8 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- Linux kernel branches for confidential compute research☆20Mar 31, 2025Updated 11 months ago
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- Transform any ARM macho executable to a dynamic library☆23Mar 19, 2020Updated 6 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- ☆18Feb 6, 2019Updated 7 years ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- ☆28Apr 18, 2024Updated last year
- A tool for detecting Spectre vulnerabilities through fuzzing☆46Aug 25, 2021Updated 4 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- do not debug me☆11Jun 26, 2019Updated 6 years ago
- ios kernel class tree☆23May 30, 2019Updated 6 years ago
- Using GNU lightning to generate xor deobfuscation at runtime☆27Aug 22, 2017Updated 8 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- ☆86Oct 29, 2023Updated 2 years ago
- Corpus set used by DIE☆41May 20, 2020Updated 5 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Export IDA microcode to BinExport format so that you can use BinDiff to diff microcodes☆12Sep 21, 2024Updated last year
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago