gkaindl / meltdown-pocView external linksLinks
A quick PoC to try out the "meltdown" timing attack.
☆153Jan 6, 2018Updated 8 years ago
Alternatives and similar repositories for meltdown-poc
Users that are interested in meltdown-poc are comparing it to the libraries listed below
Sorting:
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆774Jan 10, 2018Updated 8 years ago
- Code examples and paper for the Spoiler-Attack☆17May 28, 2019Updated 6 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- Meltdown Exploit PoC☆949Feb 14, 2018Updated 8 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 6 years ago
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Jan 9, 2018Updated 8 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆26May 23, 2017Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- ☆10Apr 11, 2023Updated 2 years ago
- Proof of concept code for the Spectre CPU exploit.☆310Jan 28, 2023Updated 3 years ago
- ☆12May 24, 2015Updated 10 years ago
- hypervisorなmemo☆13Jul 1, 2019Updated 6 years ago
- Implementation of flush + reload attack to extract private key from the GnuPG implementation of RSA.☆11Aug 8, 2019Updated 6 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- A Linux Kernel that can be booted on GoPro Hero2/Hero3 cameras☆31May 18, 2016Updated 9 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Feb 20, 2020Updated 5 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- Install hamachi on your raspberry pi☆16Jul 26, 2025Updated 6 months ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- An LLVM based mini-C to Verilog High-level Synthesis tool☆39Mar 7, 2025Updated 11 months ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Jan 27, 2020Updated 6 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- A WebExtension for users of synchronized reading lists to add a Wikimedia wiki page from the browser.☆16Apr 23, 2020Updated 5 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆15Sep 8, 2022Updated 3 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago