2019-12-08 14:19:20 +01:00
[
{
"id" : 116214746 ,
"name" : "SpecuCheck" ,
"full_name" : "ionescu007\/SpecuCheck" ,
"owner" : {
"login" : "ionescu007" ,
"id" : 6047864 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6047864?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/ionescu007"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/ionescu007\/SpecuCheck" ,
"description" : "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)" ,
"fork" : false ,
"created_at" : "2018-01-04T04:32:26Z" ,
2022-06-02 08:16:46 +02:00
"updated_at" : "2022-06-02T05:42:47Z" ,
2019-12-08 14:19:20 +01:00
"pushed_at" : "2019-11-19T03:36:46Z" ,
2022-06-02 08:16:46 +02:00
"stargazers_count" : 549 ,
"watchers_count" : 549 ,
2022-05-05 08:15:50 +02:00
"forks_count" : 94 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [
"cpu" ,
"intelbug" ,
"internals" ,
"kaiser" ,
"kernel" ,
"kpti" ,
"meltdown" ,
"spectre" ,
"windows"
] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2022-05-05 08:15:50 +02:00
"forks" : 94 ,
2022-06-02 08:16:46 +02:00
"watchers" : 549 ,
2019-12-12 06:14:27 +01:00
"score" : 0
2021-06-15 05:11:17 +02:00
} ,
2021-06-26 05:11:25 +02:00
{
"id" : 116319052 ,
"name" : "Am-I-affected-by-Meltdown" ,
"full_name" : "raphaelsc\/Am-I-affected-by-Meltdown" ,
"owner" : {
"login" : "raphaelsc" ,
"id" : 1409139 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1409139?v=4" ,
"html_url" : "https:\/\/github.com\/raphaelsc"
} ,
"html_url" : "https:\/\/github.com\/raphaelsc\/Am-I-affected-by-Meltdown" ,
"description" : "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN." ,
"fork" : false ,
"created_at" : "2018-01-04T23:51:12Z" ,
2022-04-28 02:16:10 +02:00
"updated_at" : "2022-04-27T19:26:18Z" ,
2021-06-26 05:11:25 +02:00
"pushed_at" : "2018-02-27T05:22:38Z" ,
2022-04-28 02:16:10 +02:00
"stargazers_count" : 546 ,
"watchers_count" : 546 ,
2022-01-31 13:14:22 +01:00
"forks_count" : 72 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [
"exploit" ,
"intelbug" ,
"kaiser" ,
"kpti" ,
"meltdown" ,
"poc" ,
"pti" ,
"security"
] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2022-01-31 13:14:22 +01:00
"forks" : 72 ,
2022-04-28 02:16:10 +02:00
"watchers" : 546 ,
2021-06-26 05:11:25 +02:00
"score" : 0
} ,
{
"id" : 116368807 ,
"name" : "In-Spectre-Meltdown" ,
"full_name" : "Viralmaniar\/In-Spectre-Meltdown" ,
"owner" : {
"login" : "Viralmaniar" ,
"id" : 3501170 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3501170?v=4" ,
"html_url" : "https:\/\/github.com\/Viralmaniar"
} ,
"html_url" : "https:\/\/github.com\/Viralmaniar\/In-Spectre-Meltdown" ,
"description" : "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in " ,
"fork" : false ,
"created_at" : "2018-01-05T09:43:04Z" ,
2022-02-22 07:15:01 +01:00
"updated_at" : "2022-02-22T01:34:09Z" ,
2021-06-26 05:11:25 +02:00
"pushed_at" : "2018-02-19T03:04:07Z" ,
2022-02-22 07:15:01 +01:00
"stargazers_count" : 91 ,
"watchers_count" : 91 ,
2021-06-26 05:11:25 +02:00
"forks_count" : 42 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [
"cpu" ,
"cve-2017-5715" ,
"cve-2017-5754" ,
"hacking" ,
"meltdown" ,
"penetration-testing" ,
"pentest-tool" ,
"spectre" ,
"tool" ,
"vulnerability"
] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-06-26 05:11:25 +02:00
"forks" : 42 ,
2022-02-22 07:15:01 +01:00
"watchers" : 91 ,
2021-06-26 05:11:25 +02:00
"score" : 0
} ,
{
"id" : 116449314 ,
"name" : "Am-I-affected-by-Meltdown" ,
"full_name" : "speecyy\/Am-I-affected-by-Meltdown" ,
"owner" : {
"login" : "speecyy" ,
"id" : 35145287 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4" ,
"html_url" : "https:\/\/github.com\/speecyy"
} ,
"html_url" : "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown" ,
"description" : "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a " ,
"fork" : false ,
"created_at" : "2018-01-06T03:16:33Z" ,
"updated_at" : "2020-02-27T19:31:43Z" ,
"pushed_at" : "2018-01-06T03:17:22Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-06-26 05:11:25 +02:00
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 118008705 ,
"name" : "Meltdown" ,
"full_name" : "zzado\/Meltdown" ,
"owner" : {
"login" : "zzado" ,
"id" : 17024462 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17024462?v=4" ,
"html_url" : "https:\/\/github.com\/zzado"
} ,
"html_url" : "https:\/\/github.com\/zzado\/Meltdown" ,
"description" : "PoC for Meltdown in linux (CVE-2017-5754)" ,
"fork" : false ,
"created_at" : "2018-01-18T16:32:50Z" ,
"updated_at" : "2019-01-07T02:00:09Z" ,
"pushed_at" : "2018-02-07T07:33:50Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-06-26 05:11:25 +02:00
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 119104266 ,
"name" : "meltdown-aws-scanner" ,
"full_name" : "jdmulloy\/meltdown-aws-scanner" ,
"owner" : {
"login" : "jdmulloy" ,
"id" : 3395292 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3395292?v=4" ,
"html_url" : "https:\/\/github.com\/jdmulloy"
} ,
"html_url" : "https:\/\/github.com\/jdmulloy\/meltdown-aws-scanner" ,
"description" : "Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances" ,
"fork" : false ,
"created_at" : "2018-01-26T21:18:13Z" ,
"updated_at" : "2019-02-27T18:46:20Z" ,
"pushed_at" : "2018-01-26T21:25:09Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-06-26 05:11:25 +02:00
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
2019-12-08 14:19:20 +01:00
}
]