| hackademix/noscript |
742 |
|
0 |
0 |
over 2 years ago |
0 |
|
193 |
gpl-3.0 |
JavaScript |
| The popular NoScript Security Suite browser extension. |
| Eugnis/spectre-attack |
662 |
|
0 |
0 |
over 8 years ago |
0 |
|
6 |
|
C |
| Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715) |
| marcan/speculation-bugs |
318 |
|
0 |
0 |
about 8 years ago |
0 |
|
3 |
other |
|
| Docs and resources on CPU Speculative Execution bugs |
| lsds/spectre-attack-sgx |
203 |
|
0 |
0 |
about 8 years ago |
0 |
|
1 |
apache-2.0 |
C |
| Spectre attack against SGX enclave |
| gkaindl/meltdown-poc |
141 |
|
0 |
0 |
over 8 years ago |
0 |
|
4 |
|
C |
| A quick PoC to try out the "meltdown" timing attack. |
| Viralmaniar/In-Spectre-Meltdown |
84 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in |
| flxwu/spectre-attack-demo |
73 |
|
0 |
0 |
about 8 years ago |
0 |
|
2 |
|
C |
| Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack |
| codexlynx/hardware-attacks-state-of-the-art |
67 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
lgpl-3.0 |
|
| Microarchitectural exploitation and other hardware attacks. |
| opsxcq/exploit-cve-2017-5715 |
43 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
|
C |
| Spectre exploit |
| riscv-boom/boom-attacks |
21 |
|
0 |
0 |
over 6 years ago |
0 |
|
1 |
other |
C |
| Proof of concepts for speculative attacks using the BOOM core (https://github.com/riscv-boom/riscv-boom) |