A crude implementation of an exploit for the meltdown attack. Functional (at least on my laptop!) Mostly based on the Meltdown paper and the paper describing the flush+reload cache timing attack.