cappsule / nofearLinks
Run any command transparently in a VM (this repo isn't part of Cappsule)
☆27Updated 8 years ago
Alternatives and similar repositories for nofear
Users that are interested in nofear are comparing it to the libraries listed below
Sorting:
- ☆86Updated 8 years ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- ikgt manifest☆42Updated 2 years ago
- Interactive Virtual Machine Introspection☆18Updated 7 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- ☆118Updated 4 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Updated 7 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆208Updated last year
- a bare metal (type 1) VMM (hypervisor) with a python remote control API☆183Updated 7 years ago
- grsecurity is the most advanced Linux kernel hardening patchset. This repository, not affiliated with the upstream project, aggregate mos…☆86Updated 8 years ago
- ☆70Updated 5 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 7 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- PoC LibVMI-based GDB server for virtual machines☆53Updated 7 years ago
- ☆30Updated 13 years ago
- AppJailLauncher in Rust☆110Updated 4 years ago
- A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermi…☆78Updated 4 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- CHIPSEC module that exploits UEFI boot script table vulnerability☆135Updated 9 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- StemJail: Dynamic Role Compartmentalization☆44Updated 8 years ago
- LUKS support for storing keys in TPM NVRAM☆184Updated 7 years ago
- JEFF file format tools☆27Updated 9 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago