Jlsca

Side-channel toolkit in Julia
Alternatives To Jlsca
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Speculation Bugs318
6 years ago3other
Docs and resources on CPU Speculative Execution bugs
Blacknurse165
7 years agobsd-2-clauseC
BlackNurse attack PoC
Jlsca129
2 years ago1gpl-3.0Julia
Side-channel toolkit in Julia
Hackerspray86
5 years ago21January 01, 19007C#
Repel hackers with this library by blocking brute force and malicious attempts on sensitive URLs
In Spectre Meltdown84
6 years agogpl-3.0Python
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Nemesis75
3 years agoC
Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic
Spectre Attack Demo73
6 years ago2C
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Cfautouam53
9 months ago5Shell
Automatically enables CloudFlare Under Attack Mode - Bash Script
Mona Timing Lib17
9 years ago1C
Tools for timing attacks
Autoenable Cloudflare Uam16
4 years agoShell
Auto-enable Cloudflare "Under Attack" mode when CPU load is high
Alternatives To Jlsca
Select To Compare


Alternative Project Comparisons
Popular Cpu Projects
Popular Attack Projects
Popular Hardware Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Julia
Cpu
Attack
Parallelism
High Performance Computing