A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
☆127Jan 11, 2018Updated 8 years ago
Alternatives and similar repositories for spectre-meltdown-poc
Users that are interested in spectre-meltdown-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Oct 13, 2022Updated 3 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- Meltdown/Spectre PoC for Windows☆27Mar 21, 2019Updated 7 years ago
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The open-source component of Prime+Scope, published at CCS 2021☆38Jul 18, 2023Updated 2 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- A Man in the Middle proof of concept using docker containers☆21Jul 11, 2021Updated 4 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- 分布式互联网开放端口与协议扫描☆18Jul 20, 2016Updated 9 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆17Jun 7, 2021Updated 4 years ago
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆771Jan 10, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof of concept code for the Spectre CPU exploit.☆312Jan 28, 2023Updated 3 years ago
- My minimal PoC for spectre☆41Jan 8, 2018Updated 8 years ago
- rv8 benchmark suite☆25Jul 30, 2020Updated 5 years ago
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 9 years ago
- Power line communication through processor load modulation☆12Jul 24, 2017Updated 8 years ago
- Implementation of flush + reload attack to extract private key from the GnuPG implementation of RSA.☆11Aug 8, 2019Updated 6 years ago
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 10 years ago
- PoC for Paper: BunnyHop Exploiting the Instruction Prefetcher (USENIX Security 2023)☆14Aug 17, 2023Updated 2 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆34Feb 13, 2026Updated 2 months ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 4 years ago
- Scraper to get data from crunchbase.com and read - write the data using SQLite database and JSON file.☆16Apr 27, 2019Updated 6 years ago
- Loadable Module for Keystone Enclave☆19Sep 24, 2022Updated 3 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android☆17Apr 26, 2018Updated 7 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- ☆14Nov 1, 2016Updated 9 years ago
- Revenssis Ethical Hacking Suite for Android☆12Feb 16, 2014Updated 12 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Spectre-based Meltdown attack (i.e. 2-in1) proof of concept in 99 lines of code. For more details see 'The Spectre of Meltdowns' present…☆14Jun 21, 2018Updated 7 years ago