eurecom-s3 / lemonLinks
eBPF Memory Dump Tool
☆78Updated 3 weeks ago
Alternatives and similar repositories for lemon
Users that are interested in lemon are comparing it to the libraries listed below
Sorting:
- Open Source eBPF Malware Analysis Framework☆48Updated 8 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 5 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 6 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆50Updated 4 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆64Updated 2 months ago
- Automated vulnerability discovery and annotation☆67Updated 11 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆67Updated 3 weeks ago
- ☆55Updated 9 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆76Updated last month
- A library for intercepting system calls☆99Updated 6 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆84Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 months ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆78Updated last year
- ☆28Updated 5 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Linux #rootkit and #malware revealer☆26Updated 11 months ago
- Linpmem is a linux memory acquisition tool☆85Updated 3 weeks ago
- ☆88Updated last year
- The most complete code auditing platform with thousands of real-world challenges☆124Updated 3 weeks ago
- ☆79Updated this week
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆78Updated 2 weeks ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆160Updated 8 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆119Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- ☆88Updated 5 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆71Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 4 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated last year
- ☆45Updated 8 months ago