[
    {
        "id": 116214746,
        "name": "SpecuCheck",
        "full_name": "ionescu007\/SpecuCheck",
        "owner": {
            "login": "ionescu007",
            "id": 6047864,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6047864?v=4",
            "html_url": "https:\/\/github.com\/ionescu007"
        },
        "html_url": "https:\/\/github.com\/ionescu007\/SpecuCheck",
        "description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against  CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
        "fork": false,
        "created_at": "2018-01-04T04:32:26Z",
        "updated_at": "2024-01-22T05:25:43Z",
        "pushed_at": "2019-11-19T03:36:46Z",
        "stargazers_count": 563,
        "watchers_count": 563,
        "has_discussions": false,
        "forks_count": 91,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cpu",
            "intelbug",
            "internals",
            "kaiser",
            "kernel",
            "kpti",
            "meltdown",
            "spectre",
            "windows"
        ],
        "visibility": "public",
        "forks": 91,
        "watchers": 563,
        "score": 0,
        "subscribers_count": 53
    },
    {
        "id": 116319052,
        "name": "Am-I-affected-by-Meltdown",
        "full_name": "raphaelsc\/Am-I-affected-by-Meltdown",
        "owner": {
            "login": "raphaelsc",
            "id": 1409139,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1409139?v=4",
            "html_url": "https:\/\/github.com\/raphaelsc"
        },
        "html_url": "https:\/\/github.com\/raphaelsc\/Am-I-affected-by-Meltdown",
        "description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
        "fork": false,
        "created_at": "2018-01-04T23:51:12Z",
        "updated_at": "2024-03-03T02:25:11Z",
        "pushed_at": "2018-02-27T05:22:38Z",
        "stargazers_count": 543,
        "watchers_count": 543,
        "has_discussions": false,
        "forks_count": 71,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "exploit",
            "intelbug",
            "kaiser",
            "kpti",
            "meltdown",
            "poc",
            "pti",
            "security"
        ],
        "visibility": "public",
        "forks": 71,
        "watchers": 543,
        "score": 0,
        "subscribers_count": 47
    },
    {
        "id": 116368807,
        "name": "In-Spectre-Meltdown",
        "full_name": "Viralmaniar\/In-Spectre-Meltdown",
        "owner": {
            "login": "Viralmaniar",
            "id": 3501170,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3501170?v=4",
            "html_url": "https:\/\/github.com\/Viralmaniar"
        },
        "html_url": "https:\/\/github.com\/Viralmaniar\/In-Spectre-Meltdown",
        "description": "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in ",
        "fork": false,
        "created_at": "2018-01-05T09:43:04Z",
        "updated_at": "2023-12-29T04:02:31Z",
        "pushed_at": "2018-02-19T03:04:07Z",
        "stargazers_count": 94,
        "watchers_count": 94,
        "has_discussions": false,
        "forks_count": 40,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cpu",
            "cve-2017-5715",
            "cve-2017-5754",
            "hacking",
            "meltdown",
            "penetration-testing",
            "pentest-tool",
            "spectre",
            "tool",
            "vulnerability"
        ],
        "visibility": "public",
        "forks": 40,
        "watchers": 94,
        "score": 0,
        "subscribers_count": 17
    },
    {
        "id": 116449314,
        "name": "Am-I-affected-by-Meltdown",
        "full_name": "speecyy\/Am-I-affected-by-Meltdown",
        "owner": {
            "login": "speecyy",
            "id": 35145287,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4",
            "html_url": "https:\/\/github.com\/speecyy"
        },
        "html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown",
        "description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ",
        "fork": false,
        "created_at": "2018-01-06T03:16:33Z",
        "updated_at": "2020-02-27T19:31:43Z",
        "pushed_at": "2018-01-06T03:17:22Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 118008705,
        "name": "Meltdown",
        "full_name": "zzado\/Meltdown",
        "owner": {
            "login": "zzado",
            "id": 17024462,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17024462?v=4",
            "html_url": "https:\/\/github.com\/zzado"
        },
        "html_url": "https:\/\/github.com\/zzado\/Meltdown",
        "description": "PoC for Meltdown in linux (CVE-2017-5754)",
        "fork": false,
        "created_at": "2018-01-18T16:32:50Z",
        "updated_at": "2023-11-29T09:04:53Z",
        "pushed_at": "2018-02-07T07:33:50Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 2,
        "score": 0,
        "subscribers_count": 2
    },
    {
        "id": 119104266,
        "name": "meltdown-aws-scanner",
        "full_name": "jdmulloy\/meltdown-aws-scanner",
        "owner": {
            "login": "jdmulloy",
            "id": 3395292,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3395292?v=4",
            "html_url": "https:\/\/github.com\/jdmulloy"
        },
        "html_url": "https:\/\/github.com\/jdmulloy\/meltdown-aws-scanner",
        "description": "Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances",
        "fork": false,
        "created_at": "2018-01-26T21:18:13Z",
        "updated_at": "2019-02-27T18:46:20Z",
        "pushed_at": "2018-01-26T21:25:09Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 0
    }
]