intel-tools / srsLinks
GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.
☆17Updated 9 months ago
Alternatives and similar repositories for srs
Users that are interested in srs are comparing it to the libraries listed below
Sorting:
- The Hedron Microhypervisor☆81Updated last year
- This repository contains the companion code from the "All your tracing are belong to BPF" blog posts☆18Updated 2 years ago
- Linux Security Hardening for Confidential Compute☆67Updated 10 months ago
- A fuzzer setup to fuzz libc functions.☆16Updated 2 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆14Updated last year
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆11Updated 4 months ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆167Updated 4 years ago
- A Dolev-Yao-model-guided fuzzer for TLS☆143Updated 2 weeks ago
- Easy-to-use tool which autogenerates a type-aware fuzzer from a debuggable executable.☆23Updated 2 years ago
- AIL: The angr Intermediate Language.☆32Updated 2 months ago
- Linux kernel branches for confidential compute research☆18Updated 4 months ago
- ☆14Updated 10 months ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 7 months ago
- ☆86Updated 4 months ago
- ☆13Updated 4 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Updated 4 months ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆34Updated 2 weeks ago
- kAFL Fuzzer☆34Updated 4 months ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- ROSA: Finding Backdoors with Fuzzing☆24Updated last month
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆307Updated this week
- Static instrumentation tool for efficient binary-level coverage analysis.☆148Updated 4 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- ☆22Updated last year
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆23Updated 5 years ago
- ☆65Updated 5 months ago
- VMF is a modular fuzzer that is easily reconfigurable to use many different capabilities and approaches. Also includes a web-based distri…☆32Updated 2 months ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- ☆38Updated 2 years ago