Displaying 1 to 14 from 14 results

spectre-meltdown-checker - Spectre & Meltdown vulnerability/mitigation checker for Linux

  •    Shell

A shell script to tell if your system is vulnerable against the several "speculative execution" CVEs that were made public in 2018. For Linux systems, the script will detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number and the distribution (such as Debian, Ubuntu, CentOS, RHEL, Fedora, openSUSE, Arch, ...), it also works if you've compiled your own kernel.

Spectre.css - A Lightweight, Responsive and Modern CSS Framework

  •    CSS

Spectre.css is a lightweight, responsive and modern CSS framework. Spectre is a side project based on years of CSS development work on a large web service project. Spectre only includes modern base styles, responsive layout system, CSS components and utilities, and it can be modified for your project with Sass/Scss compiler.

SpecuCheck - SpecuCheck is a Windows utility for checking the state of the software mitigations against CVE-2017-5754 (Meltdown) and hardware mitigations against CVE-2017-5715 (Spectre)

  •    C

SpecuCheck is a Windows utility for checking the state of the software and hardware mitigations against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4). It uses two new information classes that were added to the NtQuerySystemInformation API call as part of the recent patches introduced in January 2018 and reports the data as seen by the Windows Kernel. An official Microsoft Powershell Cmdlet Module now exists as well, which is the recommended and supported way to get this information.

Hardware-and-Firmware-Security-Guidance - Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance

  •    C

This repository provides content for aiding DoD administrators in verifying systems have applied and enabled mitigations for hardware and firmware vulnerabilities such as side-channel and UEFI vulnerabilities. The repository is a companion to NSA Cybersecurity Advisories such as Vulnerabilities Affecting Modern Processors. This repository is updated as new information, research, strategies, and guidance are developed. The following mitigations generally apply to all systems. For specific steps for a particular operating system or vendor product, consult detailed instructions and strategies at Specific Guidance.




deep_spectre - Deep learning side channel privileged memory reader

  •    C

Deep Spectre is a deep learning side channel privileged memory reader heavily based on the PoC found here. I've written a Medium post explaining the deep learning code and you can read more about Spectre in CVE-2017-5753 and CVE-2017-5715 or check out the whitepaper and Google Project Zero post.

pyMOSChar

  •    Python

For the gm/ID starter kit, written for MATLAB, please refer to the 'Links' section at Prof. Murmann's website: https://web.stanford.edu/~murmann. I would like to thank Prof. Murmann for giving permission to use his work and release this package under the GNU Public License.

responsive-resizer - Responsive Resizer - A web responsive layout test tool

  •    HTML

Responsive Resizer is a web responsive layout tool that helps developers test web apps across major screen resolution breakpoints. The tool is part of the Spectre.css.


spectre-attack-demo - Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack

  •    C

This shows my own try of Proof of Concept Exploit demonstrating the Spectre attack. Unfortunately, I have been able to reproduce it smoothly both on my local laptop and on my AWS Server.

spectre-attack-sgx - Spectre attack against SGX enclave

  •    C

Sample code demonstrating a Spectre-like attack against an Intel SGX enclave. This repository contains a proof-of-concept attack (SGXSpectre) showing it is indeed possible to use a speculative execution side-channel to leak data from an Intel SGX enclave.

ex_money - A [work-in-progress] self-hosted personal finance app

  •    Javascript

ExMoney is a [work-in-progress] self-hosted web application which helps you to track your personal finances. It's built around Spectre API so ExMoney can export bank transactions for you. The list of available banks you can find here. The main idea behind ExMoney is to have free, open source application which can help to track personal finances at(almost) no cost. ExMoney is written in Elixir using Phoenix framework, the app on production consumes very little of RAM and it should work just fine on Heroku free plan.

vectre - Most complete implementation of Spectre.css on Vue.js

  •    TypeScript

The documentation is in a separate repository and the source code is an excellent example of using the framework. You need Vue version 2.5+.






We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.