Viralmaniar / In-Spectre-MeltdownView external linksLinks
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs …
☆94Feb 19, 2018Updated 7 years ago
Alternatives and similar repositories for In-Spectre-Meltdown
Users that are interested in In-Spectre-Meltdown are comparing it to the libraries listed below
Sorting:
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- Spectre JS PoC for Chrome☆60Jan 18, 2018Updated 8 years ago
- ☆13Apr 14, 2014Updated 11 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆543Feb 27, 2018Updated 7 years ago
- Cross platform Instant Outbidding Bot, Instant Outbidder Bot is designed to outbid all real-time bids within a second by percentage incre…☆100Jan 17, 2023Updated 3 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- An implementation of the concepts behind the Logjam attack☆16May 1, 2016Updated 9 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Jun 28, 2017Updated 8 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Oct 1, 2016Updated 9 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆18Apr 28, 2020Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- A Sage implementation of the ROCA attack☆27May 16, 2023Updated 2 years ago
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 6 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆38Dec 17, 2014Updated 11 years ago
- LaravelN00b .env Scanner☆36Jan 14, 2020Updated 6 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29May 22, 2023Updated 2 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- A Fast Floating-Point Satisfiability Solver☆28Jul 26, 2025Updated 6 months ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- A DNS database debugger☆36Sep 9, 2022Updated 3 years ago
- Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.☆24Apr 20, 2018Updated 7 years ago
- ☆34Mar 7, 2020Updated 5 years ago
- ☆34Apr 25, 2021Updated 4 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Apr 7, 2019Updated 6 years ago