guardicore / IPCDumpLinks
☆246Updated 4 years ago
Alternatives and similar repositories for IPCDump
Users that are interested in IPCDump are comparing it to the libraries listed below
Sorting:
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 3 years ago
- ☆252Updated 4 years ago
- Checksec tool in Python, Rich output. Based on LIEF☆343Updated 2 weeks ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆200Updated 4 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- eBPF - extended Berkeley Packet Filter tooling☆124Updated 3 years ago
- collection of verified Linux kernel exploits☆188Updated 4 years ago
- Injects code into ELF executables post-build☆236Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- A kernelspace syscall interceptor and randomized faulter☆354Updated 10 months ago
- Binary Protocol Differ☆118Updated 5 years ago
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulati…☆291Updated 3 years ago
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆117Updated 2 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆115Updated last year
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆96Updated last month
- LKRG bypass methods☆73Updated 5 years ago
- ☆309Updated 2 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆65Updated 5 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- Coverage-based fuzzer for python applications☆237Updated 2 years ago
- out-of-tree kernel {module, exploit} development tool☆230Updated 10 months ago
- (Linux Kernel) Stack Monitoring Tool☆47Updated 3 years ago
- MSR Project Freta☆77Updated last year
- a tool to analyze filesystem images for security☆505Updated last year
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- Vault Exploit Defense☆129Updated last year
- Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders☆133Updated 3 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆137Updated 2 years ago