Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
☆774Jan 10, 2018Updated 8 years ago
Alternatives and similar repositories for spectre-attack
Users that are interested in spectre-attack are comparing it to the libraries listed below
Sorting:
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- A quick PoC to try out the "meltdown" timing attack.☆152Jan 6, 2018Updated 8 years ago
- Meltdown Exploit PoC☆949Feb 14, 2018Updated 8 years ago
- Proof of concept code for the Spectre CPU exploit.☆309Jan 28, 2023Updated 3 years ago
- This repository contains several applications, demonstrating the Meltdown bug.☆4,167May 30, 2022Updated 3 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆127Jan 11, 2018Updated 8 years ago
- Spectre attack against SGX enclave☆239Jan 14, 2018Updated 8 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Jan 25, 2018Updated 8 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆540Feb 27, 2018Updated 8 years ago
- ShellcodeVM☆15Jun 20, 2016Updated 9 years ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 3 years ago
- ☆198Jun 12, 2024Updated last year
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- windows net program☆13Oct 16, 2014Updated 11 years ago
- PE Infector/Cryptor source code☆16Apr 30, 2017Updated 8 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Jun 3, 2014Updated 11 years ago
- Windows 64-bits driver☆17Dec 1, 2017Updated 8 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- Code examples and paper for the Spoiler-Attack☆17May 28, 2019Updated 6 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Jan 9, 2018Updated 8 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- Website and PoC collection for transient execution attacks☆203Mar 9, 2024Updated last year
- HAXM hypervisor client☆18Nov 30, 2018Updated 7 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- CVE-2019-0859 1day Exploit☆119Feb 11, 2020Updated 6 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- ☆20Aug 3, 2018Updated 7 years ago
- a network filter using NDIS hook technique☆19Mar 28, 2013Updated 12 years ago