ascendr / spectre-chromeLinks
Spectre JS PoC for Chrome
☆60Updated 7 years ago
Alternatives and similar repositories for spectre-chrome
Users that are interested in spectre-chrome are comparing it to the libraries listed below
Sorting:
- Spectre exploit☆55Updated 8 years ago
- ☆36Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- My blog where I make a new coding project every Thursday.☆46Updated last month
- Some RSA attacks with sage☆11Updated 9 years ago
- LibELF port for JavaScript☆26Updated 3 years ago
- ARM is Turing-complete without data fetches☆58Updated 7 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 8 years ago
- Research of CVE-2014-3153 and its famous exploit towelroot on x86☆46Updated 11 years ago
- An implementation of the concepts behind the Logjam attack☆16Updated 9 years ago
- My minimal PoC for spectre☆40Updated 8 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- ☆29Updated 6 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 10 years ago
- Keystone assembler framework for JavaScript☆79Updated 2 years ago
- CVE-2016-5195 exploit written in Crystal☆12Updated 9 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 11 years ago
- A debugger in Python for Cisco c3560☆10Updated 7 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆543Updated 7 years ago
- Official QEMU mirror☆30Updated 4 months ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Updated 9 years ago
- Tracing framework for full system simulators☆57Updated 10 years ago
- ☆35Updated 7 years ago
- Spectre POC: Reading from another process☆36Updated 6 years ago
- CVE-2017-5721 Proof-of-Concept☆17Updated 8 years ago
- Simple and small library that allows disassembly of raw bytes for multiple architectures☆30Updated 2 years ago
- browser fuzzer☆56Updated 12 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆170Updated 6 years ago
- Android GuardION patches to mitigate DMA-based Rowhammer attacks on ARM☆76Updated 7 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Updated 7 years ago