ascendr / spectre-chrome
Spectre JS PoC for Chrome
☆58Updated 7 years ago
Alternatives and similar repositories for spectre-chrome:
Users that are interested in spectre-chrome are comparing it to the libraries listed below
- My minimal PoC for spectre☆40Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆44Updated 6 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Updated 5 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- LibELF port for JavaScript☆26Updated 2 years ago
- ☆13Updated 5 years ago
- Tracing framework for full system simulators☆55Updated 9 years ago
- Meltdown/Spectre PoC src collection.☆506Updated 7 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- ☆29Updated 6 years ago
- Spectre exploit☆55Updated 7 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆135Updated 7 years ago
- Retro Game Engine inspired by the SNES-era☆24Updated 2 years ago
- Working Set Page Cache side-channel IPC PoC☆66Updated 6 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆39Updated 12 years ago
- [Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth to…☆27Updated 7 years ago
- Array.prototype.slice wrong alias information.☆68Updated 6 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆165Updated 6 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- Spectre POC: Reading from another process☆35Updated 5 years ago
- Watching the Flag☆15Updated 9 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Updated 7 years ago
- My blog where I make a new coding project every Thursday.☆44Updated last year
- CTF Writeups☆23Updated 6 years ago