| paboldin/meltdown-exploit |
887 |
|
0 |
0 |
about 8 years ago |
0 |
|
17 |
|
C |
| Meltdown Exploit PoC |
| ionescu007/SpecuCheck |
544 |
|
0 |
0 |
over 6 years ago |
0 |
|
3 |
|
C |
| SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4) |
| marcan/speculation-bugs |
318 |
|
0 |
0 |
about 8 years ago |
0 |
|
3 |
other |
|
| Docs and resources on CPU Speculative Execution bugs |
| crozone/SpectrePoC |
274 |
|
0 |
0 |
about 3 years ago |
0 |
|
3 |
|
C |
| Proof of concept code for the Spectre CPU exploit. |
| Viralmaniar/In-Spectre-Meltdown |
84 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in |
| flxwu/spectre-attack-demo |
73 |
|
0 |
0 |
about 8 years ago |
0 |
|
2 |
|
C |
| Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack |
| jarmouz/spectre_meltdown |
6 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
|
|
| Meltdown and Spectre : CPU vulnerabilities — Explained and Exploited |
| feffi/docker-spectre |
5 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
mit |
C |
| Spectre and Meltdown in a docker containerized test |