Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Noscript | 742 | 5 months ago | 193 | gpl-3.0 | JavaScript | |||||
The popular NoScript Security Suite browser extension. | ||||||||||
Spectre Attack | 662 | 6 years ago | 6 | C | ||||||
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715) | ||||||||||
Speculation Bugs | 318 | 6 years ago | 3 | other | ||||||
Docs and resources on CPU Speculative Execution bugs | ||||||||||
Spectre Attack Sgx | 203 | 6 years ago | 1 | apache-2.0 | C | |||||
Spectre attack against SGX enclave | ||||||||||
Meltdown Poc | 141 | 6 years ago | 4 | C | ||||||
A quick PoC to try out the "meltdown" timing attack. | ||||||||||
In Spectre Meltdown | 84 | 6 years ago | gpl-3.0 | Python | ||||||
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in | ||||||||||
Spectre Attack Demo | 73 | 6 years ago | 2 | C | ||||||
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack | ||||||||||
Hardware Attacks State Of The Art | 67 | 9 months ago | lgpl-3.0 | |||||||
Microarchitectural exploitation and other hardware attacks. | ||||||||||
Exploit Cve 2017 5715 | 43 | 6 years ago | C | |||||||
Spectre exploit | ||||||||||
Boom Attacks | 21 | 5 years ago | 1 | other | C | |||||
Proof of concepts for speculative attacks using the BOOM core (https://github.com/riscv-boom/riscv-boom) |