mniip / spectre-meltdown-pocLinks
A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
☆129Updated 7 years ago
Alternatives and similar repositories for spectre-meltdown-poc
Users that are interested in spectre-meltdown-poc are comparing it to the libraries listed below
Sorting:
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- [Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth to…☆27Updated 7 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆38Updated 8 years ago
- ☆34Updated 9 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated last year
- The Zulu fuzzer☆125Updated 7 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 6 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆39Updated 7 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Routines for hunting down kernel structs.☆41Updated 13 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Cisco MIPS debugger☆59Updated 7 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆34Updated 8 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆35Updated 6 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- Linux local root exploit for CVE-2014-0038☆193Updated 11 years ago