[ { "id": 116214746, "name": "SpecuCheck", "full_name": "ionescu007\/SpecuCheck", "owner": { "login": "ionescu007", "id": 6047864, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6047864?v=4", "html_url": "https:\/\/github.com\/ionescu007" }, "html_url": "https:\/\/github.com\/ionescu007\/SpecuCheck", "description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)", "fork": false, "created_at": "2018-01-04T04:32:26Z", "updated_at": "2021-08-24T03:01:47Z", "pushed_at": "2019-11-19T03:36:46Z", "stargazers_count": 546, "watchers_count": 546, "forks_count": 93, "forks": 93, "watchers": 546, "score": 0 }, { "id": 116319052, "name": "Am-I-affected-by-Meltdown", "full_name": "raphaelsc\/Am-I-affected-by-Meltdown", "owner": { "login": "raphaelsc", "id": 1409139, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1409139?v=4", "html_url": "https:\/\/github.com\/raphaelsc" }, "html_url": "https:\/\/github.com\/raphaelsc\/Am-I-affected-by-Meltdown", "description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.", "fork": false, "created_at": "2018-01-04T23:51:12Z", "updated_at": "2021-08-16T18:24:59Z", "pushed_at": "2018-02-27T05:22:38Z", "stargazers_count": 547, "watchers_count": 547, "forks_count": 73, "forks": 73, "watchers": 547, "score": 0 }, { "id": 116368807, "name": "In-Spectre-Meltdown", "full_name": "Viralmaniar\/In-Spectre-Meltdown", "owner": { "login": "Viralmaniar", "id": 3501170, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3501170?v=4", "html_url": "https:\/\/github.com\/Viralmaniar" }, "html_url": "https:\/\/github.com\/Viralmaniar\/In-Spectre-Meltdown", "description": "This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in ", "fork": false, "created_at": "2018-01-05T09:43:04Z", "updated_at": "2021-07-11T01:23:44Z", "pushed_at": "2018-02-19T03:04:07Z", "stargazers_count": 88, "watchers_count": 88, "forks_count": 42, "forks": 42, "watchers": 88, "score": 0 }, { "id": 116449314, "name": "Am-I-affected-by-Meltdown", "full_name": "speecyy\/Am-I-affected-by-Meltdown", "owner": { "login": "speecyy", "id": 35145287, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4", "html_url": "https:\/\/github.com\/speecyy" }, "html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown", "description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ", "fork": false, "created_at": "2018-01-06T03:16:33Z", "updated_at": "2020-02-27T19:31:43Z", "pushed_at": "2018-01-06T03:17:22Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 118008705, "name": "Meltdown", "full_name": "zzado\/Meltdown", "owner": { "login": "zzado", "id": 17024462, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17024462?v=4", "html_url": "https:\/\/github.com\/zzado" }, "html_url": "https:\/\/github.com\/zzado\/Meltdown", "description": "PoC for Meltdown in linux (CVE-2017-5754)", "fork": false, "created_at": "2018-01-18T16:32:50Z", "updated_at": "2019-01-07T02:00:09Z", "pushed_at": "2018-02-07T07:33:50Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 119104266, "name": "meltdown-aws-scanner", "full_name": "jdmulloy\/meltdown-aws-scanner", "owner": { "login": "jdmulloy", "id": 3395292, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3395292?v=4", "html_url": "https:\/\/github.com\/jdmulloy" }, "html_url": "https:\/\/github.com\/jdmulloy\/meltdown-aws-scanner", "description": "Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances", "fork": false, "created_at": "2018-01-26T21:18:13Z", "updated_at": "2019-02-27T18:46:20Z", "pushed_at": "2018-01-26T21:25:09Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 } ]