PoC-in-GitHub/2017/CVE-2017-5754.json

194 lines
7 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
"id": 116214746,
"name": "SpecuCheck",
"full_name": "ionescu007\/SpecuCheck",
"owner": {
"login": "ionescu007",
"id": 6047864,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6047864?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/ionescu007"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/ionescu007\/SpecuCheck",
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
2022-06-02 08:16:46 +02:00
"updated_at": "2022-06-02T05:42:47Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2019-11-19T03:36:46Z",
2022-06-02 08:16:46 +02:00
"stargazers_count": 549,
"watchers_count": 549,
2022-05-05 08:15:50 +02:00
"forks_count": 94,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"cpu",
"intelbug",
"internals",
"kaiser",
"kernel",
"kpti",
"meltdown",
"spectre",
"windows"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-05-05 08:15:50 +02:00
"forks": 94,
2022-06-02 08:16:46 +02:00
"watchers": 549,
2019-12-12 06:14:27 +01:00
"score": 0
2021-06-15 05:11:17 +02:00
},
2021-06-26 05:11:25 +02:00
{
"id": 116319052,
"name": "Am-I-affected-by-Meltdown",
"full_name": "raphaelsc\/Am-I-affected-by-Meltdown",
"owner": {
"login": "raphaelsc",
"id": 1409139,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1409139?v=4",
"html_url": "https:\/\/github.com\/raphaelsc"
},
"html_url": "https:\/\/github.com\/raphaelsc\/Am-I-affected-by-Meltdown",
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
2022-04-28 02:16:10 +02:00
"updated_at": "2022-04-27T19:26:18Z",
2021-06-26 05:11:25 +02:00
"pushed_at": "2018-02-27T05:22:38Z",
2022-04-28 02:16:10 +02:00
"stargazers_count": 546,
"watchers_count": 546,
2022-01-31 13:14:22 +01:00
"forks_count": 72,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"exploit",
"intelbug",
"kaiser",
"kpti",
"meltdown",
"poc",
"pti",
"security"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-01-31 13:14:22 +01:00
"forks": 72,
2022-04-28 02:16:10 +02:00
"watchers": 546,
2021-06-26 05:11:25 +02:00
"score": 0
},
{
"id": 116368807,
"name": "In-Spectre-Meltdown",
"full_name": "Viralmaniar\/In-Spectre-Meltdown",
"owner": {
"login": "Viralmaniar",
"id": 3501170,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3501170?v=4",
"html_url": "https:\/\/github.com\/Viralmaniar"
},
"html_url": "https:\/\/github.com\/Viralmaniar\/In-Spectre-Meltdown",
"description": "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in ",
"fork": false,
"created_at": "2018-01-05T09:43:04Z",
2022-02-22 07:15:01 +01:00
"updated_at": "2022-02-22T01:34:09Z",
2021-06-26 05:11:25 +02:00
"pushed_at": "2018-02-19T03:04:07Z",
2022-02-22 07:15:01 +01:00
"stargazers_count": 91,
"watchers_count": 91,
2021-06-26 05:11:25 +02:00
"forks_count": 42,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"cpu",
"cve-2017-5715",
"cve-2017-5754",
"hacking",
"meltdown",
"penetration-testing",
"pentest-tool",
"spectre",
"tool",
"vulnerability"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-06-26 05:11:25 +02:00
"forks": 42,
2022-02-22 07:15:01 +01:00
"watchers": 91,
2021-06-26 05:11:25 +02:00
"score": 0
},
{
"id": 116449314,
"name": "Am-I-affected-by-Meltdown",
"full_name": "speecyy\/Am-I-affected-by-Meltdown",
"owner": {
"login": "speecyy",
"id": 35145287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4",
"html_url": "https:\/\/github.com\/speecyy"
},
"html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown",
"description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ",
"fork": false,
"created_at": "2018-01-06T03:16:33Z",
"updated_at": "2020-02-27T19:31:43Z",
"pushed_at": "2018-01-06T03:17:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-06-26 05:11:25 +02:00
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 118008705,
"name": "Meltdown",
"full_name": "zzado\/Meltdown",
"owner": {
"login": "zzado",
"id": 17024462,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17024462?v=4",
"html_url": "https:\/\/github.com\/zzado"
},
"html_url": "https:\/\/github.com\/zzado\/Meltdown",
"description": "PoC for Meltdown in linux (CVE-2017-5754)",
"fork": false,
"created_at": "2018-01-18T16:32:50Z",
"updated_at": "2019-01-07T02:00:09Z",
"pushed_at": "2018-02-07T07:33:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-06-26 05:11:25 +02:00
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 119104266,
"name": "meltdown-aws-scanner",
"full_name": "jdmulloy\/meltdown-aws-scanner",
"owner": {
"login": "jdmulloy",
"id": 3395292,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3395292?v=4",
"html_url": "https:\/\/github.com\/jdmulloy"
},
"html_url": "https:\/\/github.com\/jdmulloy\/meltdown-aws-scanner",
"description": "Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances",
"fork": false,
"created_at": "2018-01-26T21:18:13Z",
"updated_at": "2019-02-27T18:46:20Z",
"pushed_at": "2018-01-26T21:25:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-06-26 05:11:25 +02:00
"forks": 0,
"watchers": 1,
"score": 0
2019-12-08 14:19:20 +01:00
}
]