Viralmaniar / In-Spectre-Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs …
☆93Updated 7 years ago
Alternatives and similar repositories for In-Spectre-Meltdown:
Users that are interested in In-Spectre-Meltdown are comparing it to the libraries listed below
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 7 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- ☆15Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- ☆24Updated 6 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- See here:☆42Updated 12 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 6 years ago