dgl / vt-houdini
☆45Updated last year
Alternatives and similar repositories for vt-houdini:
Users that are interested in vt-houdini are comparing it to the libraries listed below
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆34Updated 3 weeks ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆126Updated this week
- Determine Who Can Log In to an SSH Server☆29Updated 2 years ago
- ☆23Updated 6 months ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated 8 months ago
- yxd - Yuu's heX Dumper☆88Updated 8 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆159Updated last year
- Binary Protocol Differ☆117Updated 4 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- ☆26Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆183Updated last year
- usand - convenient and minimal unshare(1)-based sandbox☆63Updated 4 years ago
- PKI support for SSH certificates☆57Updated 3 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- sandbox demo☆11Updated last year
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆11Updated last year
- go reversing helpers for binaryninja☆28Updated 2 years ago
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆27Updated 7 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆30Updated 2 years ago
- LKRG bypass methods☆71Updated 5 years ago
- ☆24Updated 11 months ago
- iTLB multihit PoC☆40Updated last year
- Simple syscall sandboxing for Linux☆130Updated last month
- Fast syncronization across networks using speedy compression, lots of parallelization and fast hashmaps for keeping track of things inter…☆95Updated 7 months ago
- Utility to find hidden Linux kernel modules☆144Updated 3 months ago
- Check security aspects of a second-level domain name.☆15Updated 9 months ago
- Minimal setup to trigger the xz backdoor☆26Updated 5 months ago
- Still point in moving world.☆50Updated 2 years ago
- A library for intercepting system calls☆71Updated 2 months ago