IPv4v6 / isicLinks
IP Stack Integrity Checker
☆33Updated last year
Alternatives and similar repositories for isic
Users that are interested in isic are comparing it to the libraries listed below
Sorting:
- Trusted Path Execution (TPE) Linux Kernel Module☆160Updated 6 years ago
- Transform vmlinuz into a fully debuggable vmlinux that can be used with /proc/kcore☆131Updated 11 months ago
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆151Updated 6 years ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆446Updated 4 months ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 3 years ago
- extended core file snapshot format☆227Updated 6 years ago
- ☆70Updated 5 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- american fuzzy lop for network fuzzing (unofficial) -- official afl site is http://lcamtuf.coredump.cx/afl/☆196Updated 6 years ago
- kCFI Documentation☆14Updated 8 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆151Updated last year
- ☆61Updated 2 years ago
- Notes on various topics I'm interested in☆160Updated 10 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆159Updated 6 years ago
- A place to store my toy linux-security modules.☆91Updated 4 years ago
- The code to the SGX-ROP paper☆184Updated 5 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆112Updated 6 years ago
- QNX and BB10 Security Tools☆166Updated 9 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆265Updated 3 years ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆231Updated 7 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆187Updated 6 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Linux Kernel Source Tree Reducer☆81Updated 10 months ago
- ☆23Updated 6 years ago
- add symbols back into a stripped ELF binary (~strip)☆175Updated 8 years ago
- Function redirection via ELF tricks.☆161Updated 10 years ago
- a friendly wrapper around ptrace☆133Updated 3 years ago