raphaelsc / Am-I-affected-by-MeltdownLinks
Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
☆541Updated 7 years ago
Alternatives and similar repositories for Am-I-affected-by-Meltdown
Users that are interested in Am-I-affected-by-Meltdown are comparing it to the libraries listed below
Sorting:
- Meltdown PoC for reading passwords from Google Chrome.☆471Updated 7 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- ☆49Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- ☆34Updated 7 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Blackhat 2012 Sample Codes☆93Updated 8 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆75Updated 7 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆102Updated 4 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Analyzing Rig Exploit Kit☆50Updated 8 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Slides and very basic examples☆111Updated 8 years ago
- ☆65Updated 8 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- All related files and slides for past talks☆44Updated 2 years ago