eurecom-s3 / lemonLinks
eBPF Memory Dump Tool
☆99Updated 5 months ago
Alternatives and similar repositories for lemon
Users that are interested in lemon are comparing it to the libraries listed below
Sorting:
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆98Updated 7 months ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆59Updated 10 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆81Updated 2 weeks ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated last month
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆81Updated last year
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆88Updated 6 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆119Updated this week
- eBPF hacks☆195Updated last year
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆283Updated 2 months ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 5 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆171Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆127Updated 7 months ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆168Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85Updated last year
- A library for intercepting system calls☆103Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆138Updated 8 months ago
- ☆90Updated 11 months ago
- ☆57Updated last year
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Updated 6 months ago
- The most complete code auditing platform with thousands of real-world challenges☆135Updated 7 months ago
- ☆16Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆139Updated last year