raphaelsc / Am-I-affected-by-Meltdown
Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
☆542Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Am-I-affected-by-Meltdown
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 7 years ago
- Meltdown PoC for reading passwords from Google Chrome.☆470Updated 6 years ago
- Spectre exploit☆55Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated last year
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- linux rootkit☆156Updated 6 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆97Updated 7 years ago
- A linux rootkit works on kernel 4.0.X or higher☆34Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- A rootkit implemented as a linux kernel module☆16Updated 9 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆103Updated 3 years ago
- Meltdown/Spectre PoC src collection.☆503Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆76Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 6 years ago
- Synesthesia, implemented as Yices scripts☆89Updated 7 years ago
- Carberp Banking Trojan☆110Updated 9 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆297Updated last year
- ☆64Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago
- ☆73Updated 6 years ago
- A quick PoC to try out the "meltdown" timing attack.☆154Updated 6 years ago
- ☆51Updated 7 years ago
- Copy of the contents at phrack.com☆35Updated 2 months ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆81Updated last year
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 6 years ago