intel-tools / srsLinks
GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.
☆16Updated last year
Alternatives and similar repositories for srs
Users that are interested in srs are comparing it to the libraries listed below
Sorting:
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆11Updated last month
- Easy-to-use tool which autogenerates a type-aware fuzzer from a debuggable executable.☆23Updated 2 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Updated last year
- ☆14Updated last week
- The Hedron Microhypervisor☆82Updated 2 years ago
- Linux kernel branches for confidential compute research☆19Updated 6 months ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 9 months ago
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Updated 6 months ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- This repository contains the companion code from the "All your tracing are belong to BPF" blog posts☆18Updated 2 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- kAFL Fuzzer☆34Updated 7 months ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆167Updated 4 years ago
- ☆21Updated 3 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated this week
- ROSA: Finding Backdoors with Fuzzing☆25Updated 3 months ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- A fuzzer setup to fuzz libc functions.☆16Updated 3 years ago
- Linux Security Hardening for Confidential Compute☆68Updated last year
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆129Updated last year
- Demo showing Claude Opus does not find CVE-2023-0266☆15Updated last year
- Explore a live Linux kernel's memory using GDB☆117Updated 2 years ago
- Alcatraz project for Black Hat USA 2021☆78Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆130Updated 3 years ago
- ☆92Updated last year
- ☆87Updated 6 months ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆53Updated 4 months ago
- AIL: The angr Intermediate Language.☆32Updated 4 months ago
- ☆13Updated 10 months ago