All Projects → Viralmaniar → In Spectre Meltdown

Viralmaniar / In Spectre Meltdown

Licence: gpl-3.0
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to In Spectre Meltdown

A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+344.19%)
Mutual labels:  hacking, penetration-testing, vulnerability
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+451.16%)
Mutual labels:  hacking, penetration-testing, pentest-tool
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+380.23%)
Mutual labels:  hacking, vulnerability, tool
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (+248.84%)
Mutual labels:  hacking, penetration-testing, pentest-tool
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+8325.58%)
Mutual labels:  hacking, penetration-testing, pentest-tool
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (+262.79%)
Mutual labels:  hacking, penetration-testing, tool
Fuxi
Penetration Testing Platform
Stars: ✭ 1,103 (+1182.56%)
Mutual labels:  penetration-testing, vulnerability, pentest-tool
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+12052.33%)
Mutual labels:  hacking, penetration-testing, vulnerability
Habu
Hacking Toolkit
Stars: ✭ 635 (+638.37%)
Mutual labels:  hacking, penetration-testing, pentest-tool
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+38166.28%)
Mutual labels:  hacking, penetration-testing, vulnerability
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+3843.02%)
Mutual labels:  hacking, penetration-testing, pentest-tool
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+788.37%)
Mutual labels:  hacking, penetration-testing, pentest-tool
Phpvuln
Audit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (+69.77%)
Mutual labels:  hacking, penetration-testing, vulnerability
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+310.47%)
Mutual labels:  hacking, penetration-testing, pentest-tool
Wprecon
WPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (+56.98%)
Mutual labels:  hacking, vulnerability, tool
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+396.51%)
Mutual labels:  hacking, penetration-testing, tool
Hackerpro
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Stars: ✭ 474 (+451.16%)
Mutual labels:  hacking, penetration-testing, tool
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+687.21%)
Mutual labels:  hacking, penetration-testing, pentest-tool
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1363.95%)
Mutual labels:  hacking, penetration-testing, pentest-tool
Eyes
👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-55.81%)
Mutual labels:  penetration-testing, pentest-tool

In-Spectre-Meltdown

This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to.

This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in

image

Please note:

This solution has been tested successfully using Python 3.6.3 & PowerShell version 5.1.

How do I use this?

  • Run the python code or download the executable from the releases section and run it as an administrator user.
  • Press Number 1, 2, 3 & 4 in sequence to see the results.
  • Press 1: Sets the execution policy to unrestricted.
  • Press 2: Imports necessary PowerShell modules
  • Press 3: Installs Spectre related modules within PowerShell
  • Press 4: Inspects control settings for Spectre & Meltdown and displays result
  • Press 5: Exit from the program

Do I need to run the executable as administrator?

  • Yes, Right click on the "In-Spectre_meltdown.exe" and run as administrator to get the results.

Questions?

Twitter: https://twitter.com/maniarviral
LinkedIn: https://au.linkedin.com/in/viralmaniar

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].