Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
☆541Feb 27, 2018Updated 8 years ago
Alternatives and similar repositories for Am-I-affected-by-Meltdown
Users that are interested in Am-I-affected-by-Meltdown are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Jun 29, 2015Updated 10 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Feb 19, 2018Updated 8 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- ip-keyloger☆11Jan 9, 2026Updated 3 months ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- My minimal PoC for spectre☆41Jan 8, 2018Updated 8 years ago
- P2P cryto-currency with dashpay and blackcoin Hybird feature☆12Feb 28, 2022Updated 4 years ago
- Meltdown PoC for reading passwords from Google Chrome.☆471Jan 9, 2018Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- Dll Injection and Code injection sample☆13Mar 10, 2015Updated 11 years ago
- ☆12Nov 5, 2022Updated 3 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- A port of Rack for the JavaScript JSGI web server interface☆36Oct 14, 2010Updated 15 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- PHP Sandbox☆21Aug 13, 2023Updated 2 years ago
- OverWatchINT is an Open Source Intelligence and All-in-One Hacking Tool. It's purpose is to reduce the time and efforts of security resea…☆11May 15, 2022Updated 3 years ago
- Implementation of kexstat via /dev/kmem with kernel ASLR support☆36Dec 5, 2015Updated 10 years ago
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆37May 4, 2016Updated 10 years ago
- Dump Apple PMU counter definitions from `/usr/share/kpep` in macOS☆16Mar 25, 2026Updated last month
- keyloger with python☆10Nov 24, 2018Updated 7 years ago
- Meltdown Exploit PoC☆948Feb 14, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A cross platform, leak free system handle wrapper☆19Oct 24, 2017Updated 8 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- This is a wallet analysis tool designed for building and testing strategies. It comes with powerful features, including: 🧨Exporting PnL …☆15Apr 29, 2026Updated last week
- Tool to dump cisco device configs via snmp and/or add new users☆13Apr 28, 2026Updated last week
- ☆14Jun 22, 2019Updated 6 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 7 years ago
- Movement Detector using python☆10Jan 5, 2021Updated 5 years ago
- A platform Where A User can Find the Online Presence of Social Media Handle on the Internet.☆12Apr 10, 2021Updated 5 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Powershell modules and commands that come in handy for pentests and red team assessments.☆22Oct 31, 2018Updated 7 years ago
- Ghost File System or simply GhostFS☆16Feb 17, 2016Updated 10 years ago
- Meltdown/Spectre PoC src collection.☆508Jan 4, 2018Updated 8 years ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆15Dec 29, 2025Updated 4 months ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Main files for the Hak5 LAN Turtle☆15Jul 26, 2015Updated 10 years ago
- A sample web application with Clickjacking vulnerabilities and its attacker website.☆12Feb 10, 2022Updated 4 years ago