opsxcq / exploit-cve-2017-5715Links
Spectre exploit
☆55Updated 7 years ago
Alternatives and similar repositories for exploit-cve-2017-5715
Users that are interested in exploit-cve-2017-5715 are comparing it to the libraries listed below
Sorting:
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- linux rootkit☆162Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆543Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Meltdown PoC for reading passwords from Google Chrome.☆470Updated 7 years ago
- NTPD remote DOS exploit and vulnerable container☆25Updated 8 years ago
- Linux local root exploit for CVE-2014-0038☆199Updated 11 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 7 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- Write ups☆16Updated 8 years ago
- ☆91Updated last year
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Black Hat 2016 Slides, Paper and Code☆82Updated 9 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆103Updated 4 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 13 years ago
- ☆15Updated 3 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago