Skip to content

Meltdown exploits critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data that is currently processed on the computer. Meltdown work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might be possible to steal data from other customers.

Notifications You must be signed in to change notification settings

mukeshpilaniya/Meltdown-Attack

About

Meltdown exploits critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data that is currently processed on the computer. Meltdown work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might be possible to steal data from other customers.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published