berthubert / sbox
sandbox demo
☆9Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for sbox
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆29Updated last year
- A tool to help you understand TPM commands and responses.☆34Updated last month
- Demonstrate ability to read memfd_secret() data from the kernel☆57Updated 10 months ago
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆113Updated last year
- egrets monitors egress☆45Updated 4 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆90Updated 8 months ago
- Minimal setup to trigger the xz backdoor☆23Updated 3 weeks ago
- ☆25Updated last year
- arm decoders for the yaxpeax project☆23Updated 4 months ago
- ☆83Updated 4 months ago
- ☆20Updated last month
- Example program using eBPF to log data being based in using shell pipes☆40Updated 3 years ago
- Simple syscall sandboxing for Linux☆128Updated this week
- A Rust library for managing eBPF programs.☆116Updated 8 months ago
- ☆11Updated last year
- RFC8484 and DoH/JSON resolver☆39Updated last year
- io_uring based network scanner written in Rust☆43Updated last year
- Tool for generating non-trivial X.509 certificate chains☆29Updated 4 months ago
- A pure-Rust library for VMware host-guest protocol ("VMXh backdoor")☆16Updated 4 months ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆34Updated 5 months ago
- LKRG bypass methods☆71Updated 4 years ago
- DSL language to write seccomp filters☆36Updated 7 months ago
- CLI tools to encode/decode things☆103Updated this week
- a friendly wrapper around ptrace☆126Updated 2 years ago
- Compress sets of integers efficiently☆19Updated 3 months ago
- Converged Security Suite for Intel & AMD platform security features☆58Updated 2 months ago
- rev.ng configuration for orchestra. The starting point for any development.☆32Updated this week
- Detect patterns of bad behavior in function calls☆25Updated 4 years ago
- Determine Who Can Log In to an SSH Server☆27Updated last year
- Checks for tpm vulnerabilities☆36Updated last year