40 Forks
91 Stars
91 Watchers

In-Spectre-Meltdown

This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in

How to download and setup In-Spectre-Meltdown

Open terminal and run command
git clone https://github.com/Viralmaniar/In-Spectre-Meltdown.git
git clone is used to create a copy or clone of In-Spectre-Meltdown repositories. You pass git clone a repository URL.
it supports a few different network protocols and corresponding URL formats.

Also you may download zip file with In-Spectre-Meltdown https://github.com/Viralmaniar/In-Spectre-Meltdown/archive/master.zip

Or simply clone In-Spectre-Meltdown with SSH
[email protected]:Viralmaniar/In-Spectre-Meltdown.git

If you have some problems with In-Spectre-Meltdown

You may open issue on In-Spectre-Meltdown support forum (system) here: https://github.com/Viralmaniar/In-Spectre-Meltdown/issues

Similar to In-Spectre-Meltdown repositories

Here you may see In-Spectre-Meltdown alternatives and analogs

 legit    tns    Musoq    hyperfine    fd    deployer    jid    dryrun    bat    TheFatRat    hiper    AppMethodOrder    hutool    TinyConsole    LifetimeTracker    windows-kernel-exploits    linux-kernel-exploits    go_command_tutorial    Common.Utility    imageflow    yard    MTuner    chroma    laravel-zero    eye    gobuster    outils    datawrapper    release-it    simiki