PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)
☆16Nov 4, 2024Updated last year
Alternatives and similar repositories for petal
Users that are interested in petal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A public repository for the class, "Software Security" at Seoul National University (SNU)☆14May 11, 2021Updated 4 years ago
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆27Mar 26, 2025Updated 11 months ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆85Nov 25, 2024Updated last year
- ☆31Oct 15, 2025Updated 5 months ago
- ☆16Aug 19, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a paper template☆59Aug 4, 2025Updated 7 months ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- Linux Kernel module to dump the page tables currently used by the CPU on intel 64bit systems with 4 level paging.☆11Jun 15, 2017Updated 8 years ago
- ☆101May 27, 2024Updated last year
- ☆20Dec 4, 2023Updated 2 years ago
- ☆25Mar 26, 2025Updated last year
- ☆41Jan 5, 2026Updated 2 months ago
- Solythesis: Securing Smart Contract with Runtime Validation☆13Mar 3, 2023Updated 3 years ago
- Flow Integrity Deterministic Enforcement System. Mechanisms for securing AI agents with information-flow control.☆81May 30, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆70Nov 13, 2025Updated 4 months ago
- ☆12Nov 7, 2025Updated 4 months ago
- Code for "The Whole Truth and Nothing But the Truth: Faithful and Controllable Dialogue Response Generation with Dataflow Transduction an…☆11Apr 30, 2024Updated last year
- ☆18Nov 7, 2024Updated last year
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆30Jun 24, 2025Updated 9 months ago
- Linux kernel source tree with changes to support LVBS with Hyper-V☆20Sep 12, 2024Updated last year
- ☆26Oct 13, 2015Updated 10 years ago
- A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.☆17Oct 11, 2023Updated 2 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A UNIX-like OS targeting AMD64 compatible processors☆18Mar 5, 2022Updated 4 years ago
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 4 months ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Linux kernel privilege escalation techniques☆153Aug 9, 2024Updated last year
- ☆14Mar 9, 2025Updated last year
- Codebase of https://arxiv.org/abs/2410.14923☆54Oct 22, 2024Updated last year
- A security oriented SoC featuring a custom pipelined RISC-V core and LCD-TFT controller☆18Dec 26, 2020Updated 5 years ago
- ☆32Apr 2, 2024Updated last year
- ☆37Jun 1, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Mar 10, 2025Updated last year
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- A tool for automatically identifying syscall-guard variables☆37Feb 10, 2026Updated last month
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆44Updated this week
- A tiny Debugger : - )☆10Jan 24, 2021Updated 5 years ago
- ETL for moving Ethereum data to Neo4j database☆21Mar 30, 2020Updated 5 years ago