| marcan/speculation-bugs |
318 |
|
0 |
0 |
about 8 years ago |
0 |
|
3 |
other |
|
| Docs and resources on CPU Speculative Execution bugs |
| jedisct1/blacknurse |
165 |
|
0 |
0 |
over 9 years ago |
0 |
|
0 |
bsd-2-clause |
C |
| BlackNurse attack PoC |
| Riscure/Jlsca |
129 |
|
0 |
0 |
about 4 years ago |
0 |
|
1 |
gpl-3.0 |
Julia |
| Side-channel toolkit in Julia |
| oazabir/HackerSpray |
86 |
|
0 |
0 |
about 7 years ago |
21 |
January 01, 1900 |
7 |
|
C# |
| Repel hackers with this library by blocking brute force and malicious attempts on sensitive URLs |
| Viralmaniar/In-Spectre-Meltdown |
84 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in |
| jovanbulck/nemesis |
75 |
|
0 |
0 |
over 4 years ago |
0 |
|
0 |
|
C |
| Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic |
| flxwu/spectre-attack-demo |
73 |
|
0 |
0 |
about 8 years ago |
0 |
|
2 |
|
C |
| Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack |
| guided-hacking/cfautouam |
53 |
|
0 |
0 |
over 2 years ago |
0 |
|
5 |
|
Shell |
| Automatically enables CloudFlare Under Attack Mode - Bash Script |
| seecurity/mona-timing-lib |
17 |
|
0 |
0 |
over 10 years ago |
0 |
|
1 |
|
C |
| Tools for timing attacks |
| cheenanet/autoenable-cloudflare-uam |
16 |
|
0 |
0 |
about 6 years ago |
0 |
|
0 |
|
Shell |
| Auto-enable Cloudflare "Under Attack" mode when CPU load is high |