Viralmaniar / In-Spectre-Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs …
☆93Updated 7 years ago
Alternatives and similar repositories for In-Spectre-Meltdown
Users that are interested in In-Spectre-Meltdown are comparing it to the libraries listed below
Sorting:
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ☆24Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- ☆15Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- ☆11Updated 9 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Side Channel script☆25Updated 2 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Rootkit Detector for UNIX☆61Updated last year