hardenedvault / vedLinks
Vault Exploit Defense
☆127Updated last year
Alternatives and similar repositories for ved
Users that are interested in ved are comparing it to the libraries listed below
Sorting:
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆139Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆184Updated 2 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆168Updated last year
- POC for Phantom Attack☆89Updated 3 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Updated 3 years ago
- LKRG bypass methods☆73Updated 6 years ago
- Dectect syscall hooking using eBPF☆168Updated 2 years ago
- Alcatraz project for Black Hat USA 2021☆78Updated 4 years ago
- An eBPF playground☆210Updated 2 years ago
- A binary hardening system☆111Updated 2 years ago
- Check linux sources dump for known CVEs.☆133Updated 3 weeks ago
- ☆312Updated 2 years ago
- Example BPF program with LSM hooks☆35Updated 4 years ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆47Updated 10 months ago
- A hacky tool for analysing linux kernel commits☆38Updated 3 years ago
- Trace deep kernel events through eBPF and lsm hooks☆42Updated 5 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 4 years ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆69Updated 5 months ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 5 years ago
- fuzz the linux kernel bpf verifier☆83Updated 4 years ago
- ☆133Updated 2 weeks ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆47Updated 2 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆149Updated 2 years ago
- ☆98Updated 4 years ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆242Updated 9 months ago
- NVRAM emulator☆100Updated last year
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆167Updated last year
- Binarly Vulnerability Research Advisories☆185Updated 2 weeks ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆68Updated 8 years ago