2019-12-08 14:19:20 +01:00
[
{
"id" : 116214746 ,
"name" : "SpecuCheck" ,
"full_name" : "ionescu007\/SpecuCheck" ,
"owner" : {
"login" : "ionescu007" ,
"id" : 6047864 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6047864?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/ionescu007"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/ionescu007\/SpecuCheck" ,
"description" : "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)" ,
"fork" : false ,
"created_at" : "2018-01-04T04:32:26Z" ,
2021-03-12 04:09:39 +01:00
"updated_at" : "2021-03-12T01:38:37Z" ,
2019-12-08 14:19:20 +01:00
"pushed_at" : "2019-11-19T03:36:46Z" ,
2021-03-12 04:09:39 +01:00
"stargazers_count" : 542 ,
"watchers_count" : 542 ,
2021-02-24 16:09:00 +01:00
"forks_count" : 94 ,
"forks" : 94 ,
2021-03-12 04:09:39 +01:00
"watchers" : 542 ,
2019-12-12 06:14:27 +01:00
"score" : 0
2021-01-07 04:10:04 +01:00
} ,
{
"id" : 116319052 ,
"name" : "Am-I-affected-by-Meltdown" ,
"full_name" : "raphaelsc\/Am-I-affected-by-Meltdown" ,
"owner" : {
"login" : "raphaelsc" ,
"id" : 1409139 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1409139?v=4" ,
2021-01-07 04:10:04 +01:00
"html_url" : "https:\/\/github.com\/raphaelsc"
} ,
"html_url" : "https:\/\/github.com\/raphaelsc\/Am-I-affected-by-Meltdown" ,
"description" : "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN." ,
"fork" : false ,
"created_at" : "2018-01-04T23:51:12Z" ,
2021-03-12 04:09:39 +01:00
"updated_at" : "2021-03-12T01:14:50Z" ,
2021-01-07 04:10:04 +01:00
"pushed_at" : "2018-02-27T05:22:38Z" ,
2021-03-12 04:09:39 +01:00
"stargazers_count" : 550 ,
"watchers_count" : 550 ,
2021-02-23 04:08:49 +01:00
"forks_count" : 73 ,
"forks" : 73 ,
2021-03-12 04:09:39 +01:00
"watchers" : 550 ,
2021-01-07 04:10:04 +01:00
"score" : 0
} ,
{
"id" : 116368807 ,
"name" : "In-Spectre-Meltdown" ,
"full_name" : "Viralmaniar\/In-Spectre-Meltdown" ,
"owner" : {
"login" : "Viralmaniar" ,
"id" : 3501170 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3501170?v=4" ,
2021-01-07 04:10:04 +01:00
"html_url" : "https:\/\/github.com\/Viralmaniar"
} ,
"html_url" : "https:\/\/github.com\/Viralmaniar\/In-Spectre-Meltdown" ,
"description" : "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in " ,
"fork" : false ,
"created_at" : "2018-01-05T09:43:04Z" ,
"updated_at" : "2020-07-27T16:02:15Z" ,
"pushed_at" : "2018-02-19T03:04:07Z" ,
"stargazers_count" : 86 ,
"watchers_count" : 86 ,
"forks_count" : 43 ,
"forks" : 43 ,
"watchers" : 86 ,
"score" : 0
} ,
2021-02-21 16:09:46 +01:00
{
"id" : 116449314 ,
"name" : "Am-I-affected-by-Meltdown" ,
"full_name" : "speecyy\/Am-I-affected-by-Meltdown" ,
"owner" : {
"login" : "speecyy" ,
"id" : 35145287 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4" ,
"html_url" : "https:\/\/github.com\/speecyy"
} ,
"html_url" : "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown" ,
"description" : "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a " ,
"fork" : false ,
"created_at" : "2018-01-06T03:16:33Z" ,
"updated_at" : "2020-02-27T19:31:43Z" ,
"pushed_at" : "2018-01-06T03:17:22Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
2021-01-07 04:10:04 +01:00
{
"id" : 118008705 ,
"name" : "Meltdown" ,
"full_name" : "zzado\/Meltdown" ,
"owner" : {
"login" : "zzado" ,
"id" : 17024462 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17024462?v=4" ,
2021-01-07 04:10:04 +01:00
"html_url" : "https:\/\/github.com\/zzado"
} ,
"html_url" : "https:\/\/github.com\/zzado\/Meltdown" ,
"description" : "PoC for Meltdown in linux (CVE-2017-5754)" ,
"fork" : false ,
"created_at" : "2018-01-18T16:32:50Z" ,
"updated_at" : "2019-01-07T02:00:09Z" ,
"pushed_at" : "2018-02-07T07:33:50Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 119104266 ,
"name" : "meltdown-aws-scanner" ,
"full_name" : "jdmulloy\/meltdown-aws-scanner" ,
"owner" : {
"login" : "jdmulloy" ,
"id" : 3395292 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3395292?v=4" ,
2021-01-07 04:10:04 +01:00
"html_url" : "https:\/\/github.com\/jdmulloy"
} ,
"html_url" : "https:\/\/github.com\/jdmulloy\/meltdown-aws-scanner" ,
"description" : "Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances" ,
"fork" : false ,
"created_at" : "2018-01-26T21:18:13Z" ,
"updated_at" : "2019-02-27T18:46:20Z" ,
"pushed_at" : "2018-01-26T21:25:09Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
2019-12-08 14:19:20 +01:00
}
]