☆17Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for lib-micro
Users that are interested in lib-micro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆88Mar 13, 2023Updated 3 years ago
- ☆47Jul 19, 2023Updated 2 years ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆32Sep 4, 2022Updated 3 years ago
- Documentation about the reversed engineered PSP interfaces/hardware components.☆28Mar 22, 2022Updated 4 years ago
- amd-nv-tool can extract and modify information from BIOS images of AMD systems☆14Jan 7, 2026Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- My collection of scripts for Ghidra (https://github.com/NationalSecurityAgency/ghidra)☆10Sep 13, 2020Updated 5 years ago
- CacheDirector - Sending Packets to the Right Slice by Exploiting Intel Last-Level Cache Addressing☆11Apr 29, 2019Updated 6 years ago
- Collection of scripts used for building a complete, standalone Clang/LLVM-based toolchain. See: https://clang.llvm.org/docs/Toolchain.htm…☆19Jun 12, 2023Updated 2 years ago
- ☆11Feb 22, 2021Updated 5 years ago
- ☆14Feb 18, 2021Updated 5 years ago
- Use hardware performance counters to find mapping of addresses to L3 slices in Intel processors☆18Jul 30, 2023Updated 2 years ago
- ☆118Sep 1, 2023Updated 2 years ago
- Esoteric data analysis utilities for Working Designs games☆19Sep 20, 2017Updated 8 years ago
- Multi-Agent Reinforcement Learning Environment for the card game SkyJo, compatible with PettingZoo and RLLIB☆16Feb 21, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆15Dec 13, 2023Updated 2 years ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Nov 11, 2022Updated 3 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- A C implementation of a self-balancing order statistic AVL tree☆17May 26, 2017Updated 8 years ago
- A simple benchmark which measures latency between CPU cores.☆41Jun 11, 2017Updated 8 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆18Oct 19, 2023Updated 2 years ago
- IP Communications for Pentair ScreenLogic2☆17Oct 21, 2018Updated 7 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- The first analysis framework for CPU microcode☆412Mar 13, 2023Updated 3 years ago
- Exploit generator for Intel ME 11 buffer overflow☆33Nov 14, 2019Updated 6 years ago
- Interface for Pentair Screenlogic connected pool controllers over IP in Python☆21Jul 14, 2025Updated 8 months ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆22Oct 18, 2024Updated last year
- The artifact for SecSMT paper -- Usenix Security 2022☆30Oct 4, 2022Updated 3 years ago
- ☆35Jun 4, 2018Updated 7 years ago
- Intel Management Engine JTAG Proof of Concept☆538Jun 12, 2020Updated 5 years ago
- Binary Utils for Zen Microcode☆48Oct 16, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Pentium II microcode (dis)assembler and (de)scrambler☆22Feb 11, 2021Updated 5 years ago
- Bink, Smacker, miles, etc binaries. No Source Code☆34Dec 13, 2022Updated 3 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Jun 27, 2022Updated 3 years ago
- Binja loader for AMD-SP or PSP firmware binaries.☆42Jan 29, 2023Updated 3 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Oct 18, 2023Updated 2 years ago
- Synthesis of loop-free programs☆24Updated this week
- ☆11Oct 1, 2021Updated 4 years ago