Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Meltdown Exploit | 887 | 6 years ago | 17 | C | ||||||
Meltdown Exploit PoC | ||||||||||
Specucheck | 544 | 4 years ago | 3 | C | ||||||
SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4) | ||||||||||
Speculation Bugs | 318 | 6 years ago | 3 | other | ||||||
Docs and resources on CPU Speculative Execution bugs | ||||||||||
Spectrepoc | 274 | a year ago | 3 | C | ||||||
Proof of concept code for the Spectre CPU exploit. | ||||||||||
In Spectre Meltdown | 84 | 6 years ago | gpl-3.0 | Python | ||||||
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in | ||||||||||
Spectre Attack Demo | 73 | 6 years ago | 2 | C | ||||||
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack | ||||||||||
Spectre_meltdown | 6 | 6 years ago | ||||||||
Meltdown and Spectre : CPU vulnerabilities — Explained and Exploited | ||||||||||
Docker Spectre | 5 | 6 years ago | mit | C | ||||||
Spectre and Meltdown in a docker containerized test |