Meltdown Exploits PoC.

Meltdown Exploits PoC.

Meltdown Exploit PoC is a Speculative optimizations execute code in a non-secure manner leaving data traces in microarchitecture such as cache.

How it works?
It works by using /proc/kallsyms to find system call table and checking whether the address of a system call found by exploiting MELTDOWN match the respective one in /proc/kallsyms.
What to do when you face this error “Unable to read /proc/kallsyms…”


That’s because your system may be preventing the program from reading kernel symbols in /proc/kallsyms due to /proc/sys/kernel/kptr_restrict set to 1. The following command will do the tricky:

Use or Run: