turbo / KPTI-PoC-CollectionLinks
Meltdown/Spectre PoC src collection.
☆508Updated 8 years ago
Alternatives and similar repositories for KPTI-PoC-Collection
Users that are interested in KPTI-PoC-Collection are comparing it to the libraries listed below
Sorting:
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- A quick PoC to try out the "meltdown" timing attack.☆153Updated 8 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- vm escape exploit☆39Updated 8 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Updated 7 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- Toolkit for Hyper-V security research☆157Updated 3 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Updated 8 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Updated 4 years ago
- A DBI tool to discover heap memory related bugs☆126Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Updated 7 years ago
- ☆63Updated 8 years ago
- ☆25Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆79Updated 7 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 7 years ago
- ☆31Updated 8 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 8 years ago
- ☆41Updated 8 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Updated 9 years ago
- ☆100Updated 7 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- by http://whereisk0shl.top/☆35Updated 7 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆69Updated 7 years ago
- Security introduction book☆23Updated 10 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Updated 7 years ago
- PoC for CVE-2017-0075☆37Updated 6 years ago
- ☆14Updated 8 years ago
- POC and exploitation of vulnerabilities☆91Updated 3 years ago