GitMirar / meltdown-pocLinks
A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf
☆134Updated 7 years ago
Alternatives and similar repositories for meltdown-poc
Users that are interested in meltdown-poc are comparing it to the libraries listed below
Sorting:
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 7 years ago
- ☆22Updated 8 years ago
- idb2pat plugin, fixed to work with IDA 6.2☆23Updated 13 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- IDA PDB Loader☆47Updated 6 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆55Updated 13 years ago
- Toy project for static analysis of ELF binaries☆30Updated 8 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆81Updated 10 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 8 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆77Updated 7 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Microsoft Edge MemGC Internals☆17Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆32Updated last year
- Simulate afl-fuzz☆16Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Updated 8 years ago
- python inspect rootkit tool☆33Updated 11 years ago