Meltdown/Spectre PoC for Windows
☆27Mar 21, 2019Updated 7 years ago
Alternatives and similar repositories for microarchitectural-attack
Users that are interested in microarchitectural-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An easy to use tool to stream hardware performance counters data as CSV☆31May 7, 2024Updated last year
- ☆13Jun 26, 2021Updated 4 years ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- My minimal PoC for spectre☆41Jan 8, 2018Updated 8 years ago
- BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect☆11May 21, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆127Jan 11, 2018Updated 8 years ago
- RV32I Single Cycle Processor (CPU)☆12Nov 14, 2021Updated 4 years ago
- 🐞 A simple Windows x86 debugging framework written in C++20 that supports software breakpoints and hardware breakpoints. It can be used …☆13Mar 30, 2025Updated last year
- Proof of Concept implementation + Brief Tutorial of the Meltdown and Spectre attacks [+ Flush/Realod]☆16Feb 1, 2019Updated 7 years ago
- ☆22Jun 24, 2019Updated 6 years ago
- OS X kernel extension for reading MSRs (Model Specific Registers)☆12Sep 27, 2016Updated 9 years ago
- GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/☆42Sep 19, 2019Updated 6 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- ☆16Jul 1, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Medusa Repository: Transynther tool and Medusa Attack☆19Jul 14, 2020Updated 5 years ago
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Feb 18, 2021Updated 5 years ago
- ARMv8 performance monitor from userspace☆84Jun 8, 2023Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Feb 19, 2018Updated 8 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)☆31Oct 16, 2018Updated 7 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- my exp for chrome V8 CVE-2021-30551☆24Apr 4, 2023Updated 3 years ago
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21May 20, 2020Updated 5 years ago
- Microarchitectural exploitation and other hardware attacks.☆97Mar 25, 2024Updated 2 years ago
- driver manual mapper☆13Feb 22, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks☆46May 19, 2023Updated 2 years ago
- Cache side-channel attack AES android☆13Sep 6, 2017Updated 8 years ago
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆39Oct 17, 2025Updated 5 months ago
- ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android☆17Apr 26, 2018Updated 7 years ago
- Source from https://twitter.com/pwnallthethings. Compiled in VS 2013☆18Jan 30, 2018Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago