dgl / vt-houdini
☆45Updated last year
Alternatives and similar repositories for vt-houdini:
Users that are interested in vt-houdini are comparing it to the libraries listed below
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 2 weeks ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 10 months ago
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Updated last year
- ☆23Updated 7 months ago
- Determine Who Can Log In to an SSH Server☆29Updated 2 years ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆126Updated 2 weeks ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆31Updated 2 years ago
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆27Updated 7 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆185Updated last year
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated last week
- DEbian Cve REproducer Tool☆24Updated last year
- Minimal setup to trigger the xz backdoor☆27Updated 6 months ago
- Binary Golf Grand Prix☆111Updated last year
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆9Updated last year
- ☆12Updated last year
- PKI support for SSH certificates☆57Updated 3 years ago
- Binary Protocol Differ☆118Updated 4 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆162Updated last year
- Simple syscall sandboxing for Linux☆132Updated 2 weeks ago
- Utility to find hidden Linux kernel modules☆144Updated 4 months ago
- ☆26Updated 2 years ago
- ☆34Updated last year
- sandbox demo☆11Updated last year
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 2 years ago
- iTLB multihit PoC☆40Updated last year
- A library for intercepting system calls☆76Updated 4 months ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆85Updated 7 months ago
- LKRG bypass methods☆72Updated 5 years ago