All Projects → codexlynx → hardware-attacks-state-of-the-art

codexlynx / hardware-attacks-state-of-the-art

Licence: LGPL-3.0 License
Microarchitectural exploitation and other hardware attacks.

Projects that are alternatives of or similar to hardware-attacks-state-of-the-art

Anakin
High performance Cross-platform Inference-engine, you could run Anakin on x86-cpu,arm, nv-gpu, amd-gpu,bitmain and cambricon devices.
Stars: ✭ 488 (+1582.76%)
Mutual labels:  arm, amd, intel
Spectre Meltdown Checker
Spectre, Meltdown, Foreshadow, Fallout, RIDL, ZombieLoad vulnerability/mitigation checker for Linux & BSD
Stars: ✭ 3,482 (+11906.9%)
Mutual labels:  spectre, meltdown, foreshadow
spectre-attack-demo
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Stars: ✭ 87 (+200%)
Mutual labels:  intel, spectre, meltdown
kleespectre
KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling
Stars: ✭ 31 (+6.9%)
Mutual labels:  spectre, meltdown, speculative-execution
ARM-episodes
Arm Episodes
Stars: ✭ 75 (+158.62%)
Mutual labels:  arm, exploitation
nix-install-vendor-gl
Ensure that a system-compatible OpenGL driver is available for `nix-shell`-encapsulated programs.
Stars: ✭ 22 (-24.14%)
Mutual labels:  amd, intel
how-to-exploit-a-double-free
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
Stars: ✭ 1,165 (+3917.24%)
Mutual labels:  exploitation, microarchitecture
nsec-badge
Software from the NorthSec badge
Stars: ✭ 34 (+17.24%)
Mutual labels:  arm, hardware
Awesome Vulkan
Awesome Vulkan ecosystem
Stars: ✭ 2,322 (+7906.9%)
Mutual labels:  arm, amd
Jiraffe
One stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+441.38%)
Mutual labels:  infosec, exploitation
volana
🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (+31.03%)
Mutual labels:  infosec, exploitation
EvoArm
An open-source 3D-printable robotic arm
Stars: ✭ 114 (+293.1%)
Mutual labels:  arm, hardware
cpu-load-side-channel
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Stars: ✭ 45 (+55.17%)
Mutual labels:  infosec, side-channel-attacks
meltdown-spectre-bios-list
a list of BIOS/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
Stars: ✭ 16 (-44.83%)
Mutual labels:  spectre, meltdown
ddcpuid
🔬 dd's x86 CPU Identification tool
Stars: ✭ 21 (-27.59%)
Mutual labels:  amd, intel
4004-SBC
Home-brew Intel 4004 Single Board Computer
Stars: ✭ 18 (-37.93%)
Mutual labels:  hardware, intel
Autodesk-Fusion-360-for-Linux
This is a project, where I give you a way to use Autodesk Fusion 360 on Linux!
Stars: ✭ 810 (+2693.1%)
Mutual labels:  amd, intel
darknet
Darknet on OpenCL Convolutional Neural Networks on OpenCL on Intel & NVidia & AMD & Mali GPUs for macOS & GNU/Linux
Stars: ✭ 160 (+451.72%)
Mutual labels:  amd, intel
Arm exploitation
Exploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (+379.31%)
Mutual labels:  arm, exploitation
Pwnshop
Exploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (+475.86%)
Mutual labels:  arm, infosec

Hardware attacks / State of the art

Microarchitectural exploitation and other hardware attacks.

Contributing:

Contributions, comments and corrections are welcome, please do PR.

Flaws:

Proof of concepts:

Other PoCs:

Resources:

Tools:

  • sandsifter: The x86 processor fuzzer.
  • OpcodeTester: Analyse Undocumented Instructions on Intel x86/x86-64 and RISC-V.
  • evsets: Tool for testing and finding minimal eviction sets.
  • cachequery: A tool for interacting with hardware memory caches in modern Intel CPUs.
  • haruspex: Exploration of x86-64 ISA using speculative execution.
  • Blacksmith: Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns.

Blogs and posts:

Other papers:

Others:

$ cat /sys/devices/system/cpu/vulnerabilities/*

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].