Systems and Software Security
☆16Nov 13, 2025Updated 4 months ago
Alternatives and similar repositories for COMSM0049
Users that are interested in COMSM0049 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- 基于eBPF实现高性能用户态文件系统功能☆14May 9, 2025Updated 11 months ago
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- practice-toy-wasm-vm-go☆11Apr 20, 2022Updated 3 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- ☆36Feb 4, 2026Updated 2 months ago
- A demo about how to build a real compiler with LLVM libraries, write for the book https://github.com/tuoxie007/play_with_llvm☆10Apr 11, 2020Updated 6 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- ☆69Jan 25, 2022Updated 4 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Mar 9, 2021Updated 5 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- ☆11Jul 26, 2022Updated 3 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 4 months ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Write mach-o minidumps that can be analyzed with lldb☆12Nov 12, 2020Updated 5 years ago
- Source code of paper "TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support"☆26Sep 14, 2024Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Unpacks Microsoft LZNT1-compressed files by calling RtlDecompressBuffer☆13Sep 10, 2014Updated 11 years ago
- Rust wrapper of libtracecmd☆25Nov 2, 2023Updated 2 years ago
- Supply Chain Security Research - Attack Trees☆10Jan 9, 2023Updated 3 years ago
- alternative reality☆18Mar 1, 2017Updated 9 years ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆12Jan 24, 2019Updated 7 years ago
- ROM of the Month☆14May 3, 2023Updated 2 years ago
- eBPF C programs injectable in a network card to extract packets' features for detecting different network attacks.☆14May 6, 2022Updated 3 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Golang eBPF RASP☆10Jul 19, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Multi-version glibc source browser based on code.woboq.org 's product.☆10Feb 27, 2020Updated 6 years ago
- Container (Docker) escape exploits☆53Dec 15, 2021Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- 虚拟机带外内存监控☆14Mar 30, 2018Updated 8 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Jul 6, 2019Updated 6 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago