Venom
cpu-load-side-channel
Venom | cpu-load-side-channel | |
---|---|---|
3 | 2 | |
360 | 46 | |
- | - | |
2.6 | 5.6 | |
7 months ago | almost 3 years ago | |
C++ | C++ | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Venom
cpu-load-side-channel
- Cross-VM side-channel data exchange via CPU load modulation
- Trivial file transfer between separate VMs executed on the same host by modulating the CPU load. This is intended as an illustration for the M1RACLES discussion, to support the point that the M1's system register does not add new means of data exchange and is not a real vulnerability
What are some alternatives?
Amsi-Killer - Lifetime AMSI bypass
chipwhisperer - ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks
Nidhogg - Nidhogg is an all-in-one simple to use rootkit.
minerva - Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
Jormungandr - Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]
Machinegun - Machinegun is an advanced version of Metasploit's railgun, capable of reliably running arbitrary Windows API functions on a remote computer and getting the results to the attacker's machine.
ardiuno-keystroke-reflection - Open Source Arduino Program for Keystroke Reflection Side Channel Attack
Cronos - PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
sub3suite - a free, open source, cross platform Intelligence gathering tool.
Elevator - UAC bypass by abusing RPC and debug objects.