[ { "id": 116768537, "name": "exploit-cve-2017-5715", "full_name": "opsxcq\/exploit-cve-2017-5715", "owner": { "login": "opsxcq", "id": 16995025, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4", "html_url": "https:\/\/github.com\/opsxcq" }, "html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715", "description": "Spectre exploit", "fork": false, "created_at": "2018-01-09T05:06:12Z", "updated_at": "2021-11-01T17:21:49Z", "pushed_at": "2018-01-09T22:27:25Z", "stargazers_count": 53, "watchers_count": 53, "forks_count": 20, "allow_forking": true, "is_template": false, "topics": [ "exploit", "intelbug", "memory-leak", "spectre" ], "visibility": "public", "forks": 20, "watchers": 53, "score": 0 }, { "id": 117425769, "name": "meltdown-spectre-bios-list", "full_name": "mathse\/meltdown-spectre-bios-list", "owner": { "login": "mathse", "id": 5393624, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5393624?v=4", "html_url": "https:\/\/github.com\/mathse" }, "html_url": "https:\/\/github.com\/mathse\/meltdown-spectre-bios-list", "description": "a list of BIOS\/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754", "fork": false, "created_at": "2018-01-14T11:52:38Z", "updated_at": "2020-07-14T16:49:36Z", "pushed_at": "2018-03-27T19:59:31Z", "stargazers_count": 15, "watchers_count": 15, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [ "bios", "cve-2017-5715", "cve-2017-5753", "cve-2017-5754", "firmware", "meltdown", "spectre" ], "visibility": "public", "forks": 5, "watchers": 15, "score": 0 }, { "id": 117585225, "name": "SpeculativeExecutionAssessment", "full_name": "GregAskew\/SpeculativeExecutionAssessment", "owner": { "login": "GregAskew", "id": 1266780, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1266780?v=4", "html_url": "https:\/\/github.com\/GregAskew" }, "html_url": "https:\/\/github.com\/GregAskew\/SpeculativeExecutionAssessment", "description": "Assesses a system for the \"speculative execution\" vulnerabilities described in CVE-2017-5715, CVE-2017-5753, CVE-2017-5754", "fork": false, "created_at": "2018-01-15T19:14:30Z", "updated_at": "2019-11-24T15:45:44Z", "pushed_at": "2019-11-24T15:45:41Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 117944815, "name": "retpoline-audit", "full_name": "dmo2118\/retpoline-audit", "owner": { "login": "dmo2118", "id": 11342823, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11342823?v=4", "html_url": "https:\/\/github.com\/dmo2118" }, "html_url": "https:\/\/github.com\/dmo2118\/retpoline-audit", "description": "A quick-and-dirty tool to verify that userspace executables are immune to Spectre variant 2 (CVE-2017-5715).", "fork": false, "created_at": "2018-01-18T06:55:53Z", "updated_at": "2018-01-20T08:00:58Z", "pushed_at": "2018-02-01T07:40:33Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]