A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
☆127Jan 11, 2018Updated 8 years ago
Alternatives and similar repositories for spectre-meltdown-poc
Users that are interested in spectre-meltdown-poc are comparing it to the libraries listed below
Sorting:
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- PassKeeper is a Windows utility that allows you to keep an encrypted list of accounts with usernames, passwords, and notes.☆13Dec 29, 2011Updated 14 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- Loadable Module for Keystone Enclave☆19Sep 24, 2022Updated 3 years ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆17Jun 7, 2021Updated 4 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- Control flow obfuscation for Java code☆12Oct 3, 2021Updated 4 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack☆87Jan 25, 2018Updated 8 years ago
- Port of EDK2 implementation of UEFI to RISC-V. See documentation at:☆17Nov 15, 2021Updated 4 years ago
- Slides and examples to accompany the September 25th invited talk at SAT 2015☆14Sep 30, 2015Updated 10 years ago
- Proof of Concept implementation + Brief Tutorial of the Meltdown and Spectre attacks [+ Flush/Realod]☆16Feb 1, 2019Updated 7 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- 分布式互联网开放端口与协议扫描☆18Jul 20, 2016Updated 9 years ago
- User programs for rCore OS☆19Jun 7, 2022Updated 3 years ago
- ☆25Jun 2, 2024Updated last year
- ☆21Mar 24, 2015Updated 10 years ago
- Plugin adding multi-binary project support to IDA Pro (WIP)☆30Sep 13, 2016Updated 9 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- This tool will help to fix the Mach-O header of iOS kernel which dump from the memory. So that IDA or function symbol-related tools can l…☆23Feb 22, 2017Updated 9 years ago
- A dynamic information flow tracing system for Android☆54Apr 21, 2021Updated 4 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- rv8 benchmark suite☆24Jul 30, 2020Updated 5 years ago
- Proof of concept code for the Spectre CPU exploit.☆310Jan 28, 2023Updated 3 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 10 years ago
- State-space estimation algorithms and models☆28Jul 19, 2016Updated 9 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Aug 22, 2016Updated 9 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆29Feb 28, 2016Updated 10 years ago
- Trust Zone Project☆21Jan 6, 2015Updated 11 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆63Aug 7, 2022Updated 3 years ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆57Aug 21, 2019Updated 6 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- 绕过burp破解版的截止日期限制. This is a tool to bypass the cracked version of the burpsuite_pro(Larry_Lau) certification deadline through time revers…☆23May 27, 2022Updated 3 years ago
- Skeleton code for new 6.858 final project --- an encrypted and authenticated file system☆24Apr 20, 2022Updated 3 years ago