GitMirar / meltdown-pocLinks
A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf
☆134Updated 7 years ago
Alternatives and similar repositories for meltdown-poc
Users that are interested in meltdown-poc are comparing it to the libraries listed below
Sorting:
- ROP based Movfuscator VM☆28Updated 8 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- PoC || GTFO Article Materials on Kernel Double Free☆12Updated 8 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆55Updated 13 years ago
- Tool to view heap chunks and memory writes (using pintool)☆40Updated 6 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Updated 7 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆22Updated 7 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- idb2pat plugin, fixed to work with IDA 6.2☆23Updated 13 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- ☆28Updated 8 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Some of the Anti-Debugging Tricks☆27Updated 8 years ago
- A simple Windows driver which crashes the system and turns the BSOD pink☆19Updated 9 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated 9 months ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Anti-Anti-Debugger Plugins☆19Updated 11 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- IDA PDB Loader☆47Updated 6 years ago
- ☆22Updated 8 years ago