ascendr / spectre-chromeLinks
Spectre JS PoC for Chrome
☆58Updated 7 years ago
Alternatives and similar repositories for spectre-chrome
Users that are interested in spectre-chrome are comparing it to the libraries listed below
Sorting:
- My minimal PoC for spectre☆40Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆165Updated 6 years ago
- Spectre exploit☆55Updated 7 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- Array.prototype.slice wrong alias information.☆68Updated 6 years ago
- LibELF port for JavaScript☆26Updated 2 years ago
- Meltdown/Spectre PoC src collection.☆508Updated 7 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆541Updated 7 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- [Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth to…☆27Updated 7 years ago
- ElectroPaint Automatic No-source Object reaSsembler (a MIPS to C decompiler)☆71Updated 11 years ago
- ☆35Updated 6 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- A fuzzing library in JavaScript. ✨☆118Updated 2 weeks ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
- ☆13Updated 5 years ago
- Root Repo for the RLBox Sandboxing Library Research prototype. Note: this is the original research prototype for this library. For the pr…☆24Updated last year
- A debugger in Python for Cisco c3560☆10Updated 7 years ago
- Retro Game Engine inspired by the SNES-era☆24Updated 2 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆35Updated 6 years ago
- My blog where I make a new coding project every Thursday.☆44Updated 2 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 5 years ago
- Node.js bindings for the Capstone disassembler library. https://parasyte.github.io/node-capstone-docs☆59Updated 7 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Updated 7 years ago
- Demos of and walkthroughs on in-browser fuzzing using WebAssembly☆124Updated 5 years ago
- Cisco MIPS debugger☆59Updated 7 years ago