dgl / vt-houdiniLinks
☆45Updated last year
Alternatives and similar repositories for vt-houdini
Users that are interested in vt-houdini are comparing it to the libraries listed below
Sorting:
- ☆23Updated 8 months ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated last month
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆127Updated last month
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 11 months ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Binary Protocol Differ☆118Updated 4 years ago
- Systemd Hardening Helper - Mirror of https://github.com/desbma/shh☆124Updated this week
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆27Updated 7 years ago
- yxd - Yuu's heX Dumper☆88Updated 11 months ago
- Determine Who Can Log In to an SSH Server☆29Updated 2 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆31Updated 2 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated 11 months ago
- sandbox demo☆11Updated last year
- ☆26Updated 2 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆188Updated last year
- go reversing helpers for binaryninja☆29Updated 2 years ago
- Minimal setup to trigger the xz backdoor☆28Updated 7 months ago
- Binary Golf Grand Prix☆111Updated last year
- Utility to find hidden Linux kernel modules☆144Updated 5 months ago
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Updated last year
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Collection of Scripts to Automatically Unlock LUKS Devices on kexec Reboot☆57Updated 6 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- DEbian Cve REproducer Tool☆24Updated last year
- Simple syscall sandboxing for Linux☆133Updated last month
- io_uring based rootkit☆191Updated last month
- Utility to execute ELF binary directly from stdin pipe.☆65Updated 2 years ago