Viralmaniar / In-Spectre-Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs …
☆93Updated 6 years ago
Related projects: ⓘ
- ☆24Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Rootkit Detector for UNIX☆60Updated last year
- An example rootkit that gives a userland process root permissions☆74Updated 4 years ago
- ☆29Updated this week
- ☆27Updated this week
- ☆69Updated this week
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 5 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 6 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 7 years ago
- Automation framework for attack-defense CTFs.☆15Updated 4 years ago
- ☆20Updated this week
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Updated 10 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆29Updated 6 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 6 years ago
- POC for IAT Parsing Payloads☆46Updated 7 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago
- An implementation of the concepts behind the Logjam attack☆16Updated 8 years ago
- ☆15Updated this week
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago