ascendr / spectre-chromeLinks
Spectre JS PoC for Chrome
☆60Updated 8 years ago
Alternatives and similar repositories for spectre-chrome
Users that are interested in spectre-chrome are comparing it to the libraries listed below
Sorting:
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- ☆37Updated 7 years ago
- My minimal PoC for spectre☆40Updated 8 years ago
- Spectre exploit☆55Updated 8 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 8 years ago
- My blog where I make a new coding project every Thursday.☆46Updated 2 months ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Updated 7 years ago
- Meltdown/Spectre PoC src collection.☆508Updated 8 years ago
- Proof of concept code for the Spectre CPU exploit.☆310Updated 3 years ago
- ARM is Turing-complete without data fetches☆58Updated 7 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆170Updated 6 years ago
- Node.js bindings for the Capstone disassembler library. https://parasyte.github.io/node-capstone-docs☆60Updated 8 years ago
- Simplified Assembly Loader - a small tool to run (headerless) machine code.☆45Updated 8 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 10 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 7 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated 2 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆543Updated 7 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Updated 3 years ago
- Some RSA attacks with sage☆11Updated 9 years ago
- Architectural privilege escalation on x86☆61Updated 7 years ago
- Tracing framework for full system simulators☆57Updated 10 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Updated 8 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆83Updated 6 years ago
- An implementation of the concepts behind the Logjam attack☆16Updated 9 years ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆41Updated 4 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Updated 9 years ago
- Official QEMU mirror☆30Updated 5 months ago
- LibELF port for JavaScript☆26Updated 3 years ago