IPv4v6 / isicLinks
IP Stack Integrity Checker
☆34Updated last year
Alternatives and similar repositories for isic
Users that are interested in isic are comparing it to the libraries listed below
Sorting:
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆154Updated 7 years ago
- american fuzzy lop for network fuzzing (unofficial) -- official afl site is http://lcamtuf.coredump.cx/afl/☆197Updated 7 years ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆449Updated 2 weeks ago
- Transform vmlinuz into a fully debuggable vmlinux that can be used with /proc/kcore☆132Updated last year
- extended core file snapshot format☆229Updated 7 years ago
- Trusted Path Execution (TPE) Linux Kernel Module☆163Updated 6 years ago
- ☆167Updated 8 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- Avatar² examples showcased in "Avatar²: A Multi-target Orchestration Platform"☆18Updated 8 years ago
- A curated list of awesome baseband research resources☆175Updated 5 years ago
- Function redirection via ELF tricks.☆164Updated 10 years ago
- QNX and BB10 Security Tools☆166Updated 9 years ago
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆202Updated 4 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆167Updated 9 years ago
- Notes on various topics I'm interested in☆161Updated 2 months ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆153Updated 2 years ago
- add symbols back into a stripped ELF binary (~strip)☆177Updated 8 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆272Updated 4 years ago
- ☆73Updated 5 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆175Updated 6 years ago
- ☆62Updated 2 years ago
- Linux Kernel Source Tree Reducer☆81Updated last year
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆188Updated 6 years ago
- Protocol Learning and Stateful Fuzzing☆355Updated 3 years ago
- ☆67Updated 5 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 3 years ago
- Security-related flags and options for C compilers☆199Updated 3 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Updated 8 years ago