Eugnis / spectre-attackLinks
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
☆774Updated 8 years ago
Alternatives and similar repositories for spectre-attack
Users that are interested in spectre-attack are comparing it to the libraries listed below
Sorting:
- Meltdown Exploit PoC☆950Updated 7 years ago
- Proof of concept code for the Spectre CPU exploit.☆310Updated 3 years ago
- My minimal PoC for spectre☆40Updated 8 years ago
- ☆197Updated last year
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆589Updated 7 years ago
- Nailgun attack on ARM devices.☆165Updated 4 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆504Updated 7 years ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- Meltdown/Spectre PoC src collection.☆508Updated 8 years ago
- Reverse Engineering Page Table Caches in Your Processor☆373Updated 4 years ago
- ☆153Updated 7 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Updated 7 years ago
- Pintool example and PoC for dynamic binary analysis☆599Updated 3 years ago
- ☆286Updated 5 years ago
- A Return-oriented Programming toolkit☆352Updated 8 years ago
- Using Intel's PIN tool to solve CTF problems☆508Updated 5 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆264Updated 3 weeks ago
- Linux Exploits☆140Updated 10 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- A Kernel fuzzer focusing on race bugs☆378Updated 6 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆343Updated 6 years ago
- ☆386Updated 6 years ago
- DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers☆337Updated 3 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆389Updated 3 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆194Updated 8 years ago
- Linux Heap Exploitation Practice☆395Updated 7 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Updated 2 months ago
- This repository contains examples of Flush+Flush cache attacks☆169Updated 4 years ago