Linux kernel source tree
☆10Oct 11, 2017Updated 8 years ago
Alternatives and similar repositories for el2linux
Users that are interested in el2linux are comparing it to the libraries listed below
Sorting:
- OpenAMP fork of the kvmtool Project. For experimental work and upstream staging.☆10Apr 4, 2024Updated last year
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆21Apr 15, 2023Updated 2 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Dec 11, 2023Updated 2 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆28Apr 15, 2023Updated 2 years ago
- ☆43Oct 20, 2025Updated 4 months ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated last year
- Hypervisor implementation for x86_64 ISA MIT JOS☆34Aug 13, 2014Updated 11 years ago
- ☆34Nov 7, 2022Updated 3 years ago
- ☆35Jul 23, 2023Updated 2 years ago
- Linux kernel boot wrapper for FAST Models☆14Jul 4, 2013Updated 12 years ago
- Framework for writing tests for RISC-V CPU/SOC validation.☆11Jan 19, 2026Updated last month
- Pure D implementation of SHA-3 (Keccak-f[1600,24]) + DUB package☆12Sep 15, 2025Updated 5 months ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Windows 98 Web Simulator☆36Jul 9, 2019Updated 6 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 4 months ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- ☆12Oct 29, 2012Updated 13 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- D programming language syntax highlighting file for GNU nano editor☆12Nov 24, 2020Updated 5 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- ☆12Apr 1, 2025Updated 10 months ago
- A lightweight client for the ACME protocol written in the D language.☆11Oct 5, 2025Updated 4 months ago
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- ☆21Feb 10, 2026Updated 2 weeks ago
- Exploring Methods of Protecting Confidential Erlang Workloads with Intel SGX☆12Jun 19, 2020Updated 5 years ago
- A collection of tools to measure and analyze MEV across Layer-2 Rollups (CCS 2024).☆15Oct 25, 2024Updated last year