zanderdk / lib-microLinks
☆15Updated last year
Alternatives and similar repositories for lib-micro
Users that are interested in lib-micro are comparing it to the libraries listed below
Sorting:
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- ☆24Updated last year
- ☆38Updated last year
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆37Updated 4 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆21Updated 4 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆61Updated 9 months ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆70Updated last year
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Updated last year
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆57Updated 3 years ago
- Proof-of-concept implementation for the paper "Reviving Meltdown 3a" (ESORICS 2023)☆15Updated last year
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆66Updated 8 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆17Updated 11 months ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆74Updated 2 years ago
- Helper library for using the IPC CLI python module of OpenIPC☆12Updated 4 years ago
- ☆57Updated 3 months ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- This is an instruction to run your own SMM code.☆105Updated 4 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆61Updated 2 years ago
- ☆74Updated 7 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- A Ghidra processor module for the EFI Byte Code (EBC)☆31Updated 4 years ago
- Pre-Silicon Hardware Fuzzing Toolkit☆56Updated 2 weeks ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- Use Ghidra Structs in Python☆29Updated 4 years ago
- Linux kernel branches for confidential compute research☆17Updated 2 months ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated last year