A quick PoC to try out the "meltdown" timing attack.
☆152Jan 6, 2018Updated 8 years ago
Alternatives and similar repositories for meltdown-poc
Users that are interested in meltdown-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆771Jan 10, 2018Updated 8 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Meltdown Exploit PoC☆948Feb 14, 2018Updated 8 years ago
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago
- Intel Performance Counter Monitoring - with FreeBSD fixes☆16Oct 15, 2014Updated 11 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Implementation of flush + reload attack to extract private key from the GnuPG implementation of RSA.☆11Aug 8, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Dec 14, 2022Updated 3 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 9 years ago
- buffer overflow exploits for simple c programs (64 bit)☆17Feb 10, 2020Updated 6 years ago
- Proof of concept code for the Spectre CPU exploit.☆312Jan 28, 2023Updated 3 years ago
- Trusted Gateway: hardened router architecture with ARM TrustZone protected firewall, routing, and NIC modules.☆15Jul 19, 2022Updated 3 years ago
- Simple docker container for compiling rust applications with target mipsel-openwrt-linux-musl with openssl support☆14Jun 28, 2019Updated 6 years ago
- SUPA☆28Jan 15, 2026Updated 2 months ago
- A Linux Kernel that can be booted on GoPro Hero2/Hero3 cameras☆31May 18, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- MemLock: Memory Usage Guided Fuzzing☆32Jun 30, 2020Updated 5 years ago
- An addon for the graphviz library to produce mind maps☆21Oct 19, 2022Updated 3 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- A library and an application to provide migratable primitives for SGX enclaves.☆22Feb 28, 2020Updated 6 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- [CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU☆55Apr 6, 2020Updated 6 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆133Jan 9, 2018Updated 8 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆40Jan 27, 2020Updated 6 years ago
- A Google Chrome extension to open/edit latex files online using www.overleaf.com without the need of any software to be installed.☆10Dec 16, 2016Updated 9 years ago
- ☆11Nov 27, 2024Updated last year
- ☆12Apr 22, 2023Updated 2 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- PoC for CVE-2020-11896 Treck TCP/IP stack and device asset investigation☆10Sep 3, 2020Updated 5 years ago