Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Speculation Bugs | 318 | 6 years ago | 3 | other | ||||||
Docs and resources on CPU Speculative Execution bugs | ||||||||||
Blacknurse | 165 | 7 years ago | bsd-2-clause | C | ||||||
BlackNurse attack PoC | ||||||||||
Jlsca | 129 | 2 years ago | 1 | gpl-3.0 | Julia | |||||
Side-channel toolkit in Julia | ||||||||||
Hackerspray | 86 | 5 years ago | 21 | January 01, 1900 | 7 | C# | ||||
Repel hackers with this library by blocking brute force and malicious attempts on sensitive URLs | ||||||||||
In Spectre Meltdown | 84 | 6 years ago | gpl-3.0 | Python | ||||||
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in | ||||||||||
Nemesis | 75 | 3 years ago | C | |||||||
Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic | ||||||||||
Spectre Attack Demo | 73 | 6 years ago | 2 | C | ||||||
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack | ||||||||||
Cfautouam | 53 | 9 months ago | 5 | Shell | ||||||
Automatically enables CloudFlare Under Attack Mode - Bash Script | ||||||||||
Mona Timing Lib | 17 | 9 years ago | 1 | C | ||||||
Tools for timing attacks | ||||||||||
Autoenable Cloudflare Uam | 16 | 4 years ago | Shell | |||||||
Auto-enable Cloudflare "Under Attack" mode when CPU load is high |