Meltdown Exploit PoC
☆949Feb 14, 2018Updated 8 years ago
Alternatives and similar repositories for meltdown-exploit
Users that are interested in meltdown-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆773Jan 10, 2018Updated 8 years ago
- This repository contains several applications, demonstrating the Meltdown bug.☆4,169May 30, 2022Updated 3 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- A quick PoC to try out the "meltdown" timing attack.☆152Jan 6, 2018Updated 8 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆133Jan 9, 2018Updated 8 years ago
- Spectre exploit☆54Jan 9, 2018Updated 8 years ago
- Proof of concept code for the Spectre CPU exploit.☆312Jan 28, 2023Updated 3 years ago
- ☆22Jun 24, 2019Updated 6 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆62Feb 22, 2017Updated 9 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆540Feb 27, 2018Updated 8 years ago
- Dump privileged ARM system registers from usermode using variant 3a of Meltdown☆245Jan 12, 2018Updated 8 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆23May 23, 2020Updated 5 years ago
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13May 17, 2022Updated 3 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Feb 19, 2018Updated 8 years ago
- SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-20…☆583Nov 19, 2019Updated 6 years ago
- Spectre POC: Reading from another process☆36Sep 9, 2019Updated 6 years ago
- A practical attack framework for precise enclave execution control☆471Jan 16, 2026Updated 2 months ago
- [UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack☆63Nov 4, 2017Updated 8 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆115Oct 8, 2018Updated 7 years ago
- Meltdown PoC for reading passwords from Google Chrome.☆470Jan 9, 2018Updated 8 years ago
- ☆29Feb 20, 2024Updated 2 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- Demo projects using virt86☆13Jul 5, 2019Updated 6 years ago
- Reptar, Downfall, Zenbleed, ZombieLoad, RIDL, Fallout, Foreshadow, Spectre, Meltdown vulnerability/mitigation checker for Linux & BSD☆3,934Feb 28, 2026Updated 3 weeks ago
- Code to evaluate XLATE attacks as well existing cache attacks.☆31Aug 17, 2018Updated 7 years ago
- This repository contains examples of Flush+Flush cache attacks☆170Oct 12, 2021Updated 4 years ago
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆35Apr 21, 2018Updated 7 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- ☆198Jun 12, 2024Updated last year
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 3 years ago
- Towards Sound Reassembly of Modern x86-64 Binaries (ASPLOS'25)☆20Apr 1, 2025Updated 11 months ago
- Training in Transient Execution and PhantomCALL, from Inception (SEC'23) Artifacts.☆40Feb 19, 2024Updated 2 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆26Dec 14, 2016Updated 9 years ago
- Website and PoC collection for transient execution attacks☆203Mar 9, 2024Updated 2 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 5 months ago
- ☆13Feb 25, 2014Updated 12 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago