GitMirar / meltdown-pocLinks
A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf
☆134Updated 7 years ago
Alternatives and similar repositories for meltdown-poc
Users that are interested in meltdown-poc are comparing it to the libraries listed below
Sorting:
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- ROP based Movfuscator VM☆28Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Windows SMEP Bypass U=S☆37Updated 9 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 11 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 8 years ago
- ☆22Updated 8 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆55Updated 14 years ago
- Tracing framework for full system simulators☆57Updated 10 years ago
- A simple Windows driver which crashes the system and turns the BSOD pink☆19Updated 9 years ago
- ☆50Updated 8 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- idb2pat plugin, fixed to work with IDA 6.2☆23Updated 14 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- This is the python wrapper for The Security Framework SRDF☆49Updated 11 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 8 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Updated 6 years ago
- WinEoP Exploitation Framework☆24Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- ROP database plugin for IDA☆32Updated 7 years ago