Recently at Black Hat Europe conference, Tal Liberman and Eugene Kogan (enSilo lab) presented a a new code injection technique called “Process Doppelgänging”, that works on all Windows versions and seems to be able to bypass most of today’s major security products.
Pavel Boldin published a new PoC exploit of Meltdown vulnerability working on Linux, written in C.
In-Spectre-Meltdown is a PoC developed by Viral Maniar using Python and Powershell to check speculative execution side-channel attacks that affect many modern processors and operating systems designs that allows unprivileged processes to steal secrets from privileged processes.
In the last hours, the vulnerabilities of the CPU have had a great prominence even in the non-specialized press. So, I think that would be useful trying to summarize the situation in a simple way.