Spectre.css - A Lightweight, Responsive and Modern CSS Framework
-
Updated
May 13, 2021 - CSS
{{ message }}
Spectre.css - A Lightweight, Responsive and Modern CSS Framework
Spectre, Meltdown, Foreshadow, Fallout, RIDL, ZombieLoad vulnerability/mitigation checker for Linux & BSD
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
Proof of concept code for the Spectre CPU exploit.
GPU-accelerated Factors analysis library and Backtester
Spectre attack against SGX enclave
A [work-in-progress] self-hosted personal finance app
A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
A modern, simple & elegant theme for Hexo
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Responsive Resizer - A web responsive layout test tool
The content of this repository was reunited with the history of it's ancestors. It's archived now to keep all former release artifacts. The new repository is available at https://github.com/aliascash/alias-wallet
Deep learning side channel privileged memory reader
KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling
oo7, a binary analysis tool to defend against Spectre vulnerabilities
A data administration component library built on the Spectre.css framework enabled with CanJS
Chrome Extension for Send Push Notification
Microarchitectural exploitation and other hardware attacks.
Spectre.css - A lightweight, responsive and modern CSS framework.
So this is a pretty simple thing I hacked together, I just wanted to post it in case somebody can use it. I broke down the SpeculationControl module that was released by Microsoft and took the script content from the get-speculationcontrolsettings cmdlet. I essentially just took their script and put it into a invoke-command script block and integrated it with Active Directory get-adcomputer. This will collect the same true/false information as before, but now it will get this data from all computers in the domain and dump it to a CSV file. I used $erroractionpreference because i wanted to hide the errors from AD computers that are not powered on. You need the RSAT tools to use get-adcomputer.
This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)
Add a description, image, and links to the spectre topic page so that developers can more easily learn about it.
To associate your repository with the spectre topic, visit your repo's landing page and select "manage topics."