dgl / vt-houdiniLinks
☆46Updated 2 months ago
Alternatives and similar repositories for vt-houdini
Users that are interested in vt-houdini are comparing it to the libraries listed below
Sorting:
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 4 months ago
- ☆23Updated 11 months ago
- Simple syscall sandboxing for Linux☆137Updated 3 weeks ago
- Binary Protocol Differ☆118Updated 5 years ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆137Updated this week
- Utility to find hidden Linux kernel modules☆144Updated last month
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- yxd - Yuu's heX Dumper☆90Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆191Updated last year
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆201Updated 2 years ago
- Determine Who Can Log In to an SSH Server☆29Updated last month
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆32Updated 2 years ago
- XZ backdoor reverse engineering☆98Updated last year
- Detect if your container is running under a hypervisor☆200Updated 10 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆28Updated 7 years ago
- A multi-arch assembly REPL and emulator for your command line.☆309Updated 8 months ago
- random dissectors☆67Updated 2 years ago
- Systemd Hardening Helper - Mirror of https://github.com/desbma/shh☆133Updated last month
- Minimal setup to trigger the xz backdoor☆28Updated 10 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated 3 months ago
- Binary Golf Grand Prix☆113Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- ☆134Updated last year
- Intercept stdin/stdout/stderr for any process☆198Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆28Updated last year
- A tool to help you understand TPM commands and responses.☆46Updated 8 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago