Spectre exploit
☆54Jan 9, 2018Updated 8 years ago
Alternatives and similar repositories for exploit-cve-2017-5715
Users that are interested in exploit-cve-2017-5715 are comparing it to the libraries listed below
Sorting:
- phpldapadmin remote exploit and vulnerable container !☆13Nov 9, 2018Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- Meltdown/Spectre experiments☆54Jan 5, 2018Updated 8 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Jan 9, 2018Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Dockerized Transmission, the most popular opensource Torrent Client☆12Nov 1, 2017Updated 8 years ago
- buffer overflow exploits for simple c programs (64 bit)☆17Feb 10, 2020Updated 6 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆17Jul 12, 2018Updated 7 years ago
- A small application allowing to discretely go outdoor, when your corporate proxy won't give you such liberty.☆12Feb 24, 2016Updated 10 years ago
- Meltdown Exploit PoC☆949Feb 14, 2018Updated 8 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Dec 27, 2022Updated 3 years ago
- Memory consistency model checking and test generation library.☆16Oct 14, 2016Updated 9 years ago
- Intrepyd Model Checker☆18Nov 5, 2021Updated 4 years ago
- TOR Server Docker image☆40Dec 6, 2019Updated 6 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆115Oct 8, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆23May 23, 2020Updated 5 years ago
- a hassle-free way to build srsLTE and srsUE☆19Sep 18, 2017Updated 8 years ago
- A small tcp server working under Mono or .NET (4.0) and provides hooks for handling data exchange with clients (works under mono and .net…☆18Mar 14, 2019Updated 6 years ago
- ☆19Dec 29, 2014Updated 11 years ago
- An Extensible Framework for Hardware Verification and Debugging☆18Sep 14, 2022Updated 3 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- SRCScan(submon) is a SRC assistant tool that periodically scans subdomains and requests WEB services on port 80/443 to check if it is ava…☆18Feb 26, 2021Updated 5 years ago
- Blacklist ip addresses caught scanning or bruteforcing hosts☆20Jan 6, 2019Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- RTLCheck☆25Oct 9, 2018Updated 7 years ago
- 微信支付宝个人收款码管理平台☆10Jun 17, 2020Updated 5 years ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- A quick PoC to try out the "meltdown" timing attack.☆152Jan 6, 2018Updated 8 years ago
- Tool that assists in migrating firewall rules from Cisco to Checkpoint. Will optimize rules for you (rationalization, reuse merging, etc.…☆22Nov 10, 2020Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Nov 20, 2017Updated 8 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)☆26Mar 10, 2020Updated 5 years ago
- An implementation of the first-order Differential Power Analysis (DPA) attack, suited for evaluations of AES-128 algorithm on microcontro…☆27Aug 6, 2013Updated 12 years ago