Meltdown/Spectre experiments
☆54Jan 5, 2018Updated 8 years ago
Alternatives and similar repositories for meltdown
Users that are interested in meltdown are comparing it to the libraries listed below
Sorting:
- A quick PoC to try out the "meltdown" timing attack.☆152Jan 6, 2018Updated 8 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆774Jan 10, 2018Updated 8 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- ☆10Nov 12, 2019Updated 6 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- Intel Performance Counter Monitoring - with FreeBSD fixes☆16Oct 15, 2014Updated 11 years ago
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆15Mar 23, 2022Updated 3 years ago
- Intrepyd Model Checker☆18Nov 5, 2021Updated 4 years ago
- Spectre exploit☆54Jan 9, 2018Updated 8 years ago
- ☆19Dec 29, 2014Updated 11 years ago
- An Extensible Framework for Hardware Verification and Debugging☆18Sep 14, 2022Updated 3 years ago
- Demo Meltdown with 100 lines code☆21Mar 3, 2018Updated 7 years ago
- ☆21Aug 23, 2021Updated 4 years ago
- RTLCheck☆25Oct 9, 2018Updated 7 years ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated 2 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Feb 19, 2020Updated 6 years ago
- Brute Force Attack 3 ^ 8 Remote Control☆28Feb 26, 2017Updated 9 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆22May 25, 2017Updated 8 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Jan 9, 2018Updated 8 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- A design automation framework to engineer decision diagrams yourself☆26Updated this week
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 6 years ago
- 正方教务系统Session Hijacking通杀0day☆26Jun 26, 2019Updated 6 years ago
- CFG explorer for binaries☆84Oct 29, 2024Updated last year
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Feb 19, 2018Updated 8 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- This is a Login application for Android using Parse server.☆10Nov 26, 2018Updated 7 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82May 3, 2015Updated 10 years ago