mniip / spectre-meltdown-pocView external linksLinks
A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
☆128Jan 11, 2018Updated 8 years ago
Alternatives and similar repositories for spectre-meltdown-poc
Users that are interested in spectre-meltdown-poc are comparing it to the libraries listed below
Sorting:
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- PassKeeper is a Windows utility that allows you to keep an encrypted list of accounts with usernames, passwords, and notes.☆13Dec 29, 2011Updated 14 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 6 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- Loadable Module for Keystone Enclave☆19Sep 24, 2022Updated 3 years ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆17Jun 7, 2021Updated 4 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- ☆16Nov 28, 2024Updated last year
- The open-source component of Prime+Scope, published at CCS 2021☆37Jul 18, 2023Updated 2 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- Securing System Logs With Intel SGX☆16Mar 31, 2017Updated 8 years ago
- Slides and examples to accompany the September 25th invited talk at SAT 2015☆14Sep 30, 2015Updated 10 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Port of EDK2 implementation of UEFI to RISC-V. See documentation at:☆17Nov 15, 2021Updated 4 years ago
- Proof of Concept implementation + Brief Tutorial of the Meltdown and Spectre attacks [+ Flush/Realod]☆16Feb 1, 2019Updated 7 years ago
- Control flow obfuscation for Java code☆12Oct 3, 2021Updated 4 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- 分布式互联网开放端口与协议扫描☆18Jul 20, 2016Updated 9 years ago
- ☆25Jun 2, 2024Updated last year
- A Man in the Middle proof of concept using docker containers☆21Jul 11, 2021Updated 4 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- rv8 benchmark suite☆23Jul 30, 2020Updated 5 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- Plugin adding multi-binary project support to IDA Pro (WIP)☆30Sep 13, 2016Updated 9 years ago
- This tool will help to fix the Mach-O header of iOS kernel which dump from the memory. So that IDA or function symbol-related tools can l…☆23Feb 22, 2017Updated 8 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- A dynamic information flow tracing system for Android☆54Apr 21, 2021Updated 4 years ago
- TEE hardware - based on the chipyard repository - hardware to accelerate TEE☆24Dec 16, 2022Updated 3 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 9 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Aug 22, 2016Updated 9 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 5 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- Trust Zone Project☆21Jan 6, 2015Updated 11 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆62Aug 7, 2022Updated 3 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 9 years ago
- Skeleton code for new 6.858 final project --- an encrypted and authenticated file system☆24Apr 20, 2022Updated 3 years ago