paboldin / meltdown-exploit
Meltdown Exploit PoC
☆947Updated 7 years ago
Alternatives and similar repositories for meltdown-exploit:
Users that are interested in meltdown-exploit are comparing it to the libraries listed below
- Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)☆766Updated 7 years ago
- Proof of concept code for the Spectre CPU exploit.☆304Updated 2 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆227Updated 2 years ago
- ☆468Updated 5 months ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- ☆187Updated 10 months ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆579Updated 6 years ago
- DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers☆334Updated 3 years ago
- a series tutorial for linux exploit development to newbie.☆556Updated last year
- Sample Rootkit for Linux☆397Updated 9 months ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆183Updated 7 years ago
- This repository contains examples of Flush+Flush cache attacks☆161Updated 3 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 7 years ago
- Linux Exploits☆138Updated 9 years ago
- Reverse Engineering Page Table Caches in Your Processor☆368Updated 4 years ago
- ☆283Updated 5 years ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- ☆362Updated 2 months ago
- My proof-of-concept exploits for the Linux kernel☆1,470Updated 3 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆220Updated 3 years ago
- This repository contains several tools to perform Cache Template Attacks☆150Updated last year
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆222Updated 4 years ago
- Tear the firmware apart with your bare hands;-)☆188Updated 3 years ago
- AFL/QEMU fuzzing with full-system emulation.☆629Updated 6 years ago
- Pintool example and PoC for dynamic binary analysis☆588Updated 3 years ago
- ☆149Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆644Updated last month
- A LKM rootkit for most newer kernel versions.☆174Updated 7 years ago