| speed47/spectre-meltdown-checker |
3,762 |
|
0 |
0 |
about 2 years ago |
0 |
|
71 |
|
Shell |
| Reptar, Downfall, Zenbleed, ZombieLoad, RIDL, Fallout, Foreshadow, Spectre, Meltdown vulnerability/mitigation checker for Linux & BSD |
| bollwarm/SecToolSet |
1,195 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
|
Shell |
| The security tool(project) Set from github。github安全项目工具集合 |
| Eugnis/spectre-attack |
662 |
|
0 |
0 |
over 8 years ago |
0 |
|
6 |
|
C |
| Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715) |
| nsacyber/Hardware-and-Firmware-Security-Guidance |
563 |
|
0 |
0 |
about 3 years ago |
0 |
|
5 |
other |
C |
| Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber |
| ionescu007/SpecuCheck |
544 |
|
0 |
0 |
over 6 years ago |
0 |
|
3 |
|
C |
| SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4) |
| hannob/meltdownspectre-patches |
341 |
|
0 |
0 |
about 8 years ago |
0 |
|
4 |
unlicense |
|
| Summary of the patch status for Meltdown / Spectre |
| marcan/speculation-bugs |
318 |
|
0 |
0 |
about 8 years ago |
0 |
|
3 |
other |
|
| Docs and resources on CPU Speculative Execution bugs |
| Viralmaniar/In-Spectre-Meltdown |
84 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in |
| vrdse/MeltdownSpectreReport |
71 |
|
0 |
0 |
over 7 years ago |
0 |
|
0 |
|
PowerShell |
| Query mitigation status of Meltdown and Spectre against one or multiple Windows computers. It uses parallelization for fast data collection. |
| codexlynx/hardware-attacks-state-of-the-art |
67 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
lgpl-3.0 |
|
| Microarchitectural exploitation and other hardware attacks. |