dgl / vt-houdini
☆45Updated last year
Alternatives and similar repositories for vt-houdini:
Users that are interested in vt-houdini are comparing it to the libraries listed below
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- Determine Who Can Log In to an SSH Server☆29Updated 2 years ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆33Updated last week
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 7 months ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆122Updated 3 weeks ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- sandbox demo☆12Updated last year
- go reversing helpers for binaryninja☆28Updated last year
- Systemd Hardening Helper - Mirror of https://github.com/desbma/shh☆113Updated this week
- Checks for tpm vulnerabilities☆36Updated last year
- A tool to help you understand TPM commands and responses.☆36Updated last month
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆57Updated 7 months ago
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Updated 10 months ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆183Updated last year
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆27Updated 7 years ago
- ☆22Updated 4 months ago
- Check security aspects of a second-level domain name.☆14Updated 7 months ago
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆11Updated last week
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆11Updated 10 months ago
- ☆25Updated last year
- Binary Protocol Differ☆117Updated 4 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆57Updated last year
- LKRG bypass methods☆71Updated 5 years ago
- iTLB multihit PoC☆40Updated last year
- Minimal setup to trigger the xz backdoor☆25Updated 3 months ago
- Simple syscall sandboxing for Linux☆130Updated this week
- ☆77Updated 7 months ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- ☆35Updated 9 months ago