• Stars
    star
    7
  • Rank 2,294,772 (Top 46 %)
  • Language
    Python
  • Created almost 2 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Layered Binary Templating

More Repositories

1

meltdown

This repository contains several applications, demonstrating the Meltdown bug.
C
4,111
star
2

ZombieLoad

Proof-of-concept for the ZombieLoad attack
C
812
star
3

rowhammerjs

Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript
C++
500
star
4

armageddon

This repository contains tools to perform modern cache attacks on ARM.
C
281
star
5

CJAG

CJAG is an open-source implementation of our cache-based jamming agreement.
C
281
star
6

KAISER

Kernel Address Isolation to have Side-channels Efficiently Removed
214
star
7

sgxrop

The code to the SGX-ROP paper
C
183
star
8

drama

This repository contains examples of DRAMA reverse-engineering and side-channel attacks
C++
170
star
9

transientfail

Website and PoC collection for transient execution attacks
C
168
star
10

flush_flush

This repository contains examples of Flush+Flush cache attacks
C
153
star
11

ChromeZero

Google Chrome extension implementing JavaScript Zero
JavaScript
149
star
12

cache_template_attacks

This repository contains several tools to perform Cache Template Attacks
C
141
star
13

merkle-tree

A C implementation of a dynamically resizeable binary SHA-256 hash tree (Merkle Tree).
C
128
star
14

sweb

SWEB Educational OS
C++
115
star
15

AEPIC

C
113
star
16

ios-analysis

Automated Binary Analysis on iOS
Shell
107
star
17

Picnic

Optimized implementation of the Picnic signature scheme
C
78
star
18

prefetch

This repository contains several tools to perform Prefetch Side-Channel Attacks
C
57
star
19

SLUBStick

C
56
star
20

jstemplate

JavaScript Template Attack proof-of-concept implementation
HTML
52
star
21

hybrid-HE-framework

C
39
star
22

msrevelio

C++
35
star
23

flipfloyd

Tools for "Another Flip in the Wall"
C
34
star
24

secure-block-device

The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data freshness, to arbitrary block device like storage mechanisms.
C
34
star
25

SnailLoad

C
32
star
26

interruptjs

Practical Keystroke Timing Attacks in Sandboxed JavaScript
HTML
31
star
27

pairings_in_c

C library for bilinear pairings
C
26
star
28

memsec

Framework for building transparent memory encryption and authentication solutions
VHDL
25
star
29

CollidePower

C
22
star
30

keydrown

Eliminating Keystroke Timing Attacks
C
21
star
31

gzkbpp

Implementation of the ZKB++ proof system
C++
20
star
32

Chestnut

C
20
star
33

coco-alma

CocoAlma is an execution-aware tool for formal verification of masked implementations
Python
20
star
34

ascon_hardware

Hardware implementations of the authenticated encryption design ASCON
VHDL
19
star
35

flecc_in_c

FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C
Scilab
18
star
36

ProcHarvester

ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Java
17
star
37

drawio2tikz

drawio2tikz - a tool to translate drawio xml files to readable and adaptable tikz code
Python
16
star
38

Donky

C
14
star
39

fish-begol

Implementation of the Fish and Begol signature schemes
C
13
star
40

halfdouble

C++
12
star
41

marvellous-attacks

Attacks on Jarvis and Friday
Python
10
star
42

Jenny

C
10
star
43

SCAnDroid

Java
9
star
44

Memory-Compression-Attacks

Memory Compression Attacks
C
9
star
45

data-gui

DATA GUI
Python
9
star
46

sgxjail

Makefile
8
star
47

ios-analysis-llvmslicer

C++
7
star
48

CoronaHeatMap

C++
7
star
49

CryptoSlice

Static Analysis of Cryptography in Android Applications
Java
7
star
50

wolfSSL-DoS

Proof of concept for denial of service attack on wolfSSL's DTLS server implementation.
C
7
star
51

FLARE

C
6
star
52

coco-ibex

SystemVerilog
5
star
53

CryptoTL

C++
5
star
54

CacheSim

C++
5
star
55

CSIRowhammer

CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer
C
5
star
56

CrySIL

JavaScript
4
star
57

LVI-NULLify

C
4
star
58

contextlight

The PoC for ConTExT-light
C
4
star
59

rebecca

REBECCA is a tool for the formal verification of masked cryptographic hardware implementations that, given the netlist of a masked hardware circuit, determines if a correct separation between shares is preserved throughout the circuit.
Verilog
4
star
60

libdropit

Proof-of-concept implementation of DropIt
C
3
star
61

daps-dl

Short DAPS from ECDSA in OpenSSL
C
3
star
62

TBIBS

Time-bound identity-based signatures (TBIBΣ) for Short-Lived Forward-Secure Delegation in TLS
Java
3
star
63

romulush_collisions

TeX
3
star
64

Picnic-FPGA

FPGA implementation of Picnic and LowMC
VHDL
3
star
65

spearv

C
3
star
66

rainier-signatures

C++
2
star
67

bnpp_helium_signatures

C++
2
star
68

minefield

C++
2
star
69

trusted-location-based-services

Prototype 1, Prototype 2 and base components for Trusted Location Based Services on Android devices.
Java
2
star
70

Remote-Memory-Deduplication-Attacks

Remote Page Deduplication Attacks
Python
2
star
71

ios-analysis-dagger

C++
2
star
72

servas

1
star
73

sgxjail-sdk

Implementation of SGXJail in the Linux SGX SDK
C++
1
star
74

banquet-signature-variants

C++
1
star
75

mimc-analysis

mimc-analysis
C++
1
star
76

MPC-Accumulator

Java
1
star
77

DefectsInDepth

Python
1
star