Systems and Software Security
☆16Nov 13, 2025Updated 3 months ago
Alternatives and similar repositories for COMSM0049
Users that are interested in COMSM0049 are comparing it to the libraries listed below
Sorting:
- 基于eBPF实现高性能用户态文件系统功能☆14May 9, 2025Updated 9 months ago
- ☆23Nov 16, 2023Updated 2 years ago
- ☆29Dec 11, 2025Updated 2 months ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Trace deep kernel events through eBPF and lsm hooks☆42Feb 9, 2021Updated 5 years ago
- A python plugin integrated into Carla Simulator for emulate cyber-attack over the CAN-Bus (https://carla.org/)☆15Apr 26, 2021Updated 4 years ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- DRSource is an extensible, multi-language static analysis tool designed to detect vulnerabilities in source code. It uses a pluggable arc…☆14Updated this week
- An open-source software based testing framework for automotive cybersecurity☆12Jul 14, 2023Updated 2 years ago
- A demo about how to build a real compiler with LLVM libraries, write for the book https://github.com/tuoxie007/play_with_llvm☆10Apr 11, 2020Updated 5 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- QNAP NAS firmware encryption/decryption tool☆11Sep 5, 2020Updated 5 years ago
- Golang eBPF RASP☆10Jul 19, 2023Updated 2 years ago
- Extract Procedural Details of the TTP based on the actor mentioned in OSINT reportings☆13Feb 25, 2024Updated 2 years ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Jul 6, 2019Updated 6 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Multi-version glibc source browser based on code.woboq.org 's product.☆10Feb 27, 2020Updated 6 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Continuous functions formalized in Lean4. A students project accompanied by a YouTube video.☆17Jul 10, 2025Updated 7 months ago
- ☆14Dec 2, 2021Updated 4 years ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆12Jan 24, 2019Updated 7 years ago
- Source code and data about our large scale study about Java annotaion in practice☆12Apr 14, 2023Updated 2 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Feb 5, 2026Updated 3 weeks ago
- CO-RE code for the Netdata eBPF plugin.☆16Feb 6, 2026Updated 3 weeks ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Jepsen tests for local filesystems, running on a single node.☆16Aug 15, 2022Updated 3 years ago
- Protect your docker container from the public internet☆12Sep 5, 2017Updated 8 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Packaging the systems and operations of the Chameleon testbed☆18Updated this week
- practice-toy-wasm-vm-go☆11Apr 20, 2022Updated 3 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- A simple tool to do linux emergency check☆11Mar 16, 2020Updated 5 years ago
- Rust wrapper of libtracecmd☆25Nov 2, 2023Updated 2 years ago
- a better basefinder☆12Aug 25, 2021Updated 4 years ago
- Hades is an cross-platform HIDS with kernel-space data collection.☆50May 29, 2023Updated 2 years ago