☆11Feb 22, 2016Updated 10 years ago
Alternatives and similar repositories for LiCShield
Users that are interested in LiCShield are comparing it to the libraries listed below
Sorting:
- Automatic AppArmor management for Docker containers☆16Jul 22, 2023Updated 2 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 8 years ago
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆70May 3, 2022Updated 3 years ago
- Provide a trusted platform for with Image Encryption capabilities with secure key delivery and management based in root of trust and host…☆10Jul 21, 2020Updated 5 years ago
- The purpose of this project is to log the magento error and exception messages to sentry, too. This extension is an extension of the Mage…☆26Apr 6, 2018Updated 7 years ago
- BPFContain is a container security daemon for GNU/Linux leveraging the power and safety of eBPF and Rust.☆59Jun 30, 2022Updated 3 years ago
- CNNVD 漏洞收集☆18Jul 18, 2023Updated 2 years ago
- Open Air Interface EPC's MME, HSS, PWG & SGW☆15Oct 12, 2017Updated 8 years ago
- ☆13Mar 25, 2021Updated 4 years ago
- CVE-2022-0492 EXP and Analysis write up☆33Mar 11, 2022Updated 4 years ago
- For paper Container-IMA: https://www.usenix.org/system/files/raid2019-luo.pdf☆12Mar 12, 2020Updated 6 years ago
- Exploration project to invoke syscalls in arbitrary unix processes with ptrace.☆21Jun 14, 2023Updated 2 years ago
- ☆28Nov 24, 2021Updated 4 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- ConPan: Analyze your Docker container in peace☆47Aug 1, 2022Updated 3 years ago
- Public repository for the paper "GodExpo: An Automated God Structure Detection Tool for Golang"☆13Feb 28, 2019Updated 7 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- GDB scripts☆14Nov 30, 2012Updated 13 years ago
- ☆13Oct 9, 2023Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last month
- Windbg scripts☆19Mar 5, 2015Updated 11 years ago
- A bookmarket to add bubble cursor functionality to any website.☆27Oct 4, 2010Updated 15 years ago
- Time_series_forecasting in R using ARIMA,Auto ARIMA ,Arimax and Holt Winters☆22Nov 14, 2017Updated 8 years ago
- Weakness-Oriented Assertion Recommendation For Golang (source code for submission in ISSRE'19)☆23Jan 7, 2020Updated 6 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- A tiny Debugger : - )☆10Jan 24, 2021Updated 5 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Kubernetes Operator for Redis cluster based on Undermoon☆27Feb 11, 2023Updated 3 years ago
- A demo helps you have a quick start to Tencent Cloud Mesh 🚀☆11Sep 9, 2022Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- Process Filter for Python☆16Jan 19, 2016Updated 10 years ago
- A buildpack for hosting static HTML sites on Cloud Foundry using Nginx☆24Sep 9, 2018Updated 7 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- ☆25Jun 2, 2024Updated last year
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- The bit that takes some bits, mashes them together with other bits, and produces a new bit☆18Feb 25, 2026Updated 3 weeks ago
- Checking the behavior of insanely huge tables on particular speed☆33Apr 20, 2014Updated 11 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Nov 3, 2024Updated last year