Spectre.css - A Lightweight, Responsive and Modern CSS Framework
-
Updated
Aug 27, 2020 - CSS
{{ message }}
Spectre.css - A Lightweight, Responsive and Modern CSS Framework
Spectre, Meltdown, Foreshadow, Fallout, RIDL, ZombieLoad vulnerability/mitigation checker for Linux & BSD
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
Proof of concept code for the Spectre CPU exploit.
Spectre attack against SGX enclave
A [work-in-progress] self-hosted personal finance app
A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
A modern, simple & elegant theme for Hexo
GPU-accelerated Factors analysis library and Backtester
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Responsive Resizer - A web responsive layout test tool
Deep learning side channel privileged memory reader
A data administration component library built on the Spectre.css framework enabled with CanJS
KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling
Spectre.css - A lightweight, responsive and modern CSS framework.
oo7, a binary analysis tool to defend against Spectre vulnerabilities
So this is a pretty simple thing I hacked together, I just wanted to post it in case somebody can use it. I broke down the SpeculationControl module that was released by Microsoft and took the script content from the get-speculationcontrolsettings cmdlet. I essentially just took their script and put it into a invoke-command script block and integrated it with Active Directory get-adcomputer. This will collect the same true/false information as before, but now it will get this data from all computers in the domain and dump it to a CSV file. I used $erroractionpreference because i wanted to hide the errors from AD computers that are not powered on. You need the RSAT tools to use get-adcomputer.
a list of BIOS/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
Chrome Extension for Send Push Notification
OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output
A small real-time chat application built with Vue.js, Firebase and Spectre.css.
Add a description, image, and links to the spectre topic page so that developers can more easily learn about it.
To associate your repository with the spectre topic, visit your repo's landing page and select "manage topics."
While moving to the QtWebEngine, the functionality of synchronous function calls from/to JavaScript/C++ is not supported anymore duo to the nature of the QtWebEngine (vs the old QtWebKit)
I have disabled the translation feature temporary. It should not be that difficult to work on it. here is the commit
spectrecoin/spectre@c068978#di