Spectre POC: Reading from another process
☆36Sep 9, 2019Updated 6 years ago
Alternatives and similar repositories for spectre
Users that are interested in spectre are comparing it to the libraries listed below
Sorting:
- An easy to use tool to stream hardware performance counters data as CSV☆31May 7, 2024Updated last year
- Spectre JS PoC for Chrome☆60Jan 18, 2018Updated 8 years ago
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/☆42Sep 19, 2019Updated 6 years ago
- Fine-grained frequency and voltage transition tests☆25Jun 11, 2023Updated 2 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- ☆15May 30, 2023Updated 2 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Meltdown Exploit PoC☆949Feb 14, 2018Updated 8 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- My minimal PoC for spectre☆40Jan 8, 2018Updated 8 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆27Apr 18, 2018Updated 7 years ago
- Test suite containing a reproduction of all major transient-execution attacks in RISC-V and CHERI-RISC-V assembly☆17Jun 7, 2021Updated 4 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- A flush-reload side channel attack implementation☆56Mar 26, 2022Updated 3 years ago
- This repository contains the verification suite for verifying Berkeley Out-of-Order Machine (BOOM) against transient execution attacks ba…☆21Mar 2, 2023Updated 3 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 11 years ago
- CLKscrew Code and Scripts☆28May 23, 2020Updated 5 years ago
- ☆21Aug 23, 2021Updated 4 years ago
- fork of myevic firmware for tubo project☆11Apr 23, 2018Updated 7 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- BinView is a prototype for an application for binary data visualization. It can be used for analyzing large binary blocks and/or files, a…☆14Feb 16, 2015Updated 11 years ago
- Slim dockerized Android ndk☆12Mar 3, 2023Updated 3 years ago
- Convert MIDI files to Serum and Vital LFOs.☆13Aug 31, 2023Updated 2 years ago
- Red Teaming Tradecraft☆32Sep 28, 2022Updated 3 years ago
- This is a read-only mirror of the kvm-unit-tests repository from https://gitlab.com/kvm-unit-tests/kvm-unit-tests. Pull requests here at …☆31Jan 23, 2026Updated last month
- ☆47Mar 16, 2026Updated last week
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 11 years ago
- ☆15Mar 27, 2018Updated 7 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- Go语言爆破Sha256前四字符☆10May 21, 2019Updated 6 years ago
- Last Writer Slicing: data provenance tracking for concurrent program debugging & analysis☆13Nov 14, 2014Updated 11 years ago