cappsule / nofear
Run any command transparently in a VM (this repo isn't part of Cappsule)
☆27Updated 8 years ago
Alternatives and similar repositories for nofear
Users that are interested in nofear are comparing it to the libraries listed below
Sorting:
- ☆85Updated 8 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆77Updated 5 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- an open source toolkit for PCI bus exploration☆70Updated 8 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆49Updated 4 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆40Updated 8 years ago
- ikgt manifest☆42Updated 2 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermi…☆77Updated 4 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- rune - radare2 based symbolic emulator☆27Updated 7 years ago
- ☆30Updated 13 years ago
- ☆38Updated 9 years ago
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- ☆118Updated 4 years ago
- PoC LibVMI-based GDB server for virtual machines☆53Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- ☆17Updated 7 years ago
- Picon☆39Updated 8 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- a friendly wrapper around ptrace☆131Updated 3 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Updated 7 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 7 years ago