Eugnis / spectre-attackLinks
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
☆767Updated 7 years ago
Alternatives and similar repositories for spectre-attack
Users that are interested in spectre-attack are comparing it to the libraries listed below
Sorting:
- Meltdown Exploit PoC☆947Updated 7 years ago
- Proof of concept code for the Spectre CPU exploit.☆304Updated 2 years ago
- ☆187Updated 11 months ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- Nailgun attack on ARM devices.☆165Updated 4 years ago
- ☆281Updated 5 years ago
- Meltdown/Spectre PoC src collection.☆508Updated 7 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆580Updated 6 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆183Updated 7 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- This repository contains several applications, demonstrating the Meltdown bug.☆4,140Updated 3 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆337Updated 6 years ago
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- binary patching from Python☆637Updated last year
- A Return-oriented Programming toolkit☆350Updated 8 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆256Updated 2 months ago
- generate and search pattern string for exploit development☆201Updated 3 months ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆497Updated 6 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- This repository contains examples of Flush+Flush cache attacks☆163Updated 3 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- Reverse Engineering Page Table Caches in Your Processor☆371Updated 4 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- Using Intel's PIN tool to solve CTF problems☆499Updated 5 years ago
- A practical attack framework for precise enclave execution control☆457Updated 3 weeks ago
- ☆384Updated 5 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆62Updated 7 years ago
- DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers☆336Updated 3 years ago
- My minimal PoC for spectre☆40Updated 7 years ago