IPv4v6 / isic
IP Stack Integrity Checker
☆30Updated 9 months ago
Alternatives and similar repositories for isic:
Users that are interested in isic are comparing it to the libraries listed below
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆149Updated 6 years ago
- kCFI Documentation☆14Updated 8 years ago
- Transform vmlinuz into a fully debuggable vmlinux that can be used with /proc/kcore☆131Updated 7 months ago
- This repo contains Marvell Octeon SoC toolchain source code and patches. Provided "AS IS" and WITHOUT SUPPORT. No support for any changes…☆23Updated 2 months ago
- Linux Kernel Source Tree Reducer☆80Updated 6 months ago
- A place to store my toy linux-security modules.☆92Updated 4 years ago
- Trusted Path Execution (TPE) Linux Kernel Module☆160Updated 5 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- A curated list of awesome baseband research resources☆167Updated 5 years ago
- Different tools for different routers.☆56Updated last year
- ☆26Updated 3 years ago
- Intel Management Engine firmware loader plugin for IDA☆91Updated 7 years ago
- ☆104Updated 8 months ago
- ☆62Updated last year
- The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 6 years ago
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆49Updated 4 years ago
- Debugger for the Shannon Baseband☆58Updated 4 years ago
- (Linux Kernel) Stack Monitoring Tool☆45Updated 3 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 3 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- fuzzing framework based on libfuzzer and clang sanitizer☆166Updated 6 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156Updated 8 years ago
- Explore a live Linux kernel's memory using GDB☆115Updated 2 years ago
- Platform Firmware Auditing Tool☆131Updated 6 years ago
- Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework☆23Updated 4 years ago
- Emulating Exynos 4210 BootROM in QEMU☆72Updated 5 years ago
- Kernel and filesystem extractor☆58Updated 2 years ago
- ☆40Updated 7 years ago