Skip to content
#

spectre

Here are 108 public repositories matching this topic...

Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber

  • Updated Jul 19, 2021
  • C

This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in

  • Updated Feb 19, 2018
  • Python

So this is a pretty simple thing I hacked together, I just wanted to post it in case somebody can use it. I broke down the SpeculationControl module that was released by Microsoft and took the script content from the get-speculationcontrolsettings cmdlet. I essentially just took their script and put it into a invoke-command script block and integrated it with Active Directory get-adcomputer. This will collect the same true/false information as before, but now it will get this data from all computers in the domain and dump it to a CSV file. I used $erroractionpreference because i wanted to hide the errors from AD computers that are not powered on. You need the RSAT tools to use get-adcomputer.

  • Updated Jan 6, 2018
  • PowerShell

Improve this page

Add a description, image, and links to the spectre topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the spectre topic, visit your repo's landing page and select "manage topics."

Learn more