ionescu007 / SpecuCheck
SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)
☆575Updated 5 years ago
Alternatives and similar repositories for SpecuCheck
Users that are interested in SpecuCheck are comparing it to the libraries listed below
Sorting:
- Enhanced version of the GFlags tool☆83Updated 5 years ago
- A GUI version of the classic PoolMon tool☆113Updated 6 years ago
- Cisco Talos MBR Filter Driver☆342Updated 7 years ago
- Elevation by environment variable expansion☆65Updated 8 years ago
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆151Updated 4 years ago
- Monitor activity of any driver☆334Updated 4 years ago
- Portable Executable Explorer☆156Updated 4 years ago
- Windows Recycle Bin analyser☆147Updated last month
- AppContainer and LPAC (Less Privileged AppContainer) Launcher with Capabilities☆59Updated 7 months ago
- Expand compressed files from WinSxS folder☆158Updated 10 months ago
- Sandboxed, Rust-based, Windows Defender Client☆178Updated 7 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆174Updated 6 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆115Updated 7 years ago
- Official implementation of the VirusTotal API in C programming language☆111Updated 2 years ago
- Speculation control powershell script☆133Updated 2 years ago
- Tool to disable Intel AMT on Windows☆140Updated 7 years ago
- PC firmware exploitation tool and library☆254Updated 3 years ago
- BCD is a module to interact with boot configuration data (BCD) either locally or remotely using the ROOT/WMI:Bcd* WMI classes. The functi…☆61Updated 4 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆261Updated 3 years ago
- The history of Windows Internals via symbols.☆177Updated 3 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- Remove encryption from the ESD files distributed through the Windows Store infrastructure☆50Updated 8 years ago
- Windows Console Monitoring☆99Updated 7 years ago
- Analysis and manipulation of extended attribute ($EA) on NTFS☆38Updated 9 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Run any executable as SYSTEM account (no service required)☆129Updated last year
- This is a simple filter that will block any attempt to access streams beginning with ":$i30:". This stops the spurious corruption warning…☆73Updated 4 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- ☆43Updated this week