mniip / spectre-meltdown-pocLinks
A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
☆128Updated 8 years ago
Alternatives and similar repositories for spectre-meltdown-poc
Users that are interested in spectre-meltdown-poc are comparing it to the libraries listed below
Sorting:
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Updated 7 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 9 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 8 years ago
- Meltdown/Spectre PoC src collection.☆508Updated 8 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆97Updated 9 years ago
- Tracing framework for full system simulators☆57Updated 10 years ago
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- Implementation of the SMM rootkit "The Watcher"☆131Updated 3 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 13 years ago
- ☆49Updated 7 years ago
- ROPChain generator.☆40Updated 7 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Updated 7 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Updated 11 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- collection of evil code☆14Updated 12 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Updated 9 years ago
- A Python tool to generate ROP chains☆65Updated 11 months ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Updated 8 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago