eurecom-s3 / lemonLinks
eBPF Memory Dump Tool
☆82Updated 2 months ago
Alternatives and similar repositories for lemon
Users that are interested in lemon are comparing it to the libraries listed below
Sorting:
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 2 months ago
- Open Source eBPF Malware Analysis Framework☆49Updated 10 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 8 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆51Updated 5 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated 3 weeks ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- io_uring based rootkit☆225Updated 4 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 weeks ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆68Updated this week
- The most complete code auditing platform with thousands of real-world challenges☆125Updated 2 months ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆14Updated 3 weeks ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆85Updated last month
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- A library for intercepting system calls☆101Updated 7 months ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆78Updated last year
- ☆28Updated 6 months ago
- ☆19Updated this week
- ☆89Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆161Updated 9 months ago
- eBPF hacks☆187Updated 8 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆112Updated last month
- Binary Exploitation Phrack CTF Challenge☆85Updated this week
- ☆55Updated 10 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆201Updated 10 months ago
- Linux #rootkit and #malware revealer☆26Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- In-Memory Rootkit For Linux and BSD☆76Updated 2 weeks ago