eurecom-s3 / lemonLinks
eBPF Memory Dump Tool
☆85Updated 2 weeks ago
Alternatives and similar repositories for lemon
Users that are interested in lemon are comparing it to the libraries listed below
Sorting:
- Open Source eBPF Malware Analysis Framework☆49Updated 10 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 2 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 7 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆70Updated 8 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆69Updated 3 weeks ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated last month
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- Binary Exploitation Phrack CTF Challenge☆59Updated 3 weeks ago
- A library for intercepting system calls☆102Updated 8 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated last month
- Rust Linux Kernel Module designed for LKM rootkit detection☆52Updated 6 months ago
- The most complete code auditing platform with thousands of real-world challenges☆127Updated 2 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- ☆49Updated 10 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Binary Exploitation Phrack CTF Challenge☆126Updated 3 weeks ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆89Updated last week
- ☆28Updated 7 months ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆78Updated last year
- io_uring based rootkit☆233Updated 4 months ago
- ☆89Updated 7 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated 3 weeks ago
- Linpmem is a linux memory acquisition tool☆87Updated 2 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆163Updated 10 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆122Updated 3 months ago
- ☆37Updated 9 months ago
- Linux #rootkit and #malware revealer☆27Updated last year
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago