Meltdown/Spectre experiments
☆54Jan 5, 2018Updated 8 years ago
Alternatives and similar repositories for meltdown
Users that are interested in meltdown are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A quick PoC to try out the "meltdown" timing attack.☆152Jan 6, 2018Updated 8 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆771Jan 10, 2018Updated 8 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- Demo Meltdown with 100 lines code☆21Mar 3, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- My minimal PoC for spectre☆41Jan 8, 2018Updated 8 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Intel Performance Counter Monitoring - with FreeBSD fixes☆16Oct 15, 2014Updated 11 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 3 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- ☆13Nov 5, 2020Updated 5 years ago
- 「盐与避难所」中文 Wiki☆12May 11, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- 完整版:the purported Equation Group(NSA下属) hack by the Shadow Brokers(影子经纪人)--234MB☆18Jan 25, 2018Updated 8 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Feb 19, 2018Updated 8 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆22Feb 19, 2020Updated 6 years ago
- ☆15Dec 22, 2025Updated 5 months ago
- Notepad++ syntax highlighting and autocompletion for AutoHotkey☆21Sep 5, 2021Updated 4 years ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- Meltdown/Spectre PoC for Windows☆27Mar 21, 2019Updated 7 years ago
- Spectre exploit☆54Jan 9, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- qihoo 360T7 resources and official firmware☆16May 29, 2023Updated 2 years ago
- This is an read-only mirror of the gem5 simulator. The upstream repository is stored in https://gem5.googlesource.com, code reviews shoul…☆15Mar 23, 2022Updated 4 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 10 months ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 4 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆36Apr 21, 2018Updated 8 years ago
- Demo Spectre with 70 lines code☆126Mar 2, 2018Updated 8 years ago
- An unnecessarily tiny and minimal implementation of GPT-2 in NumPy.☆11Feb 12, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Constant-time choose between two variables in Clang/LLVM☆21Apr 14, 2018Updated 8 years ago
- 正方教务系统Session Hijacking通杀0day☆27Jun 26, 2019Updated 6 years ago
- Source from https://twitter.com/pwnallthethings. Compiled in VS 2013☆18Jan 30, 2018Updated 8 years ago
- ☆12Dec 23, 2025Updated 5 months ago
- 链家二手房挂牌价爬虫☆10Jul 6, 2022Updated 3 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆17Dec 2, 2025Updated 5 months ago