intel-tools / srs
GitHub Actions based repository scanning workflows with a primary goal of evaluating C & C++ repositories for risks.
☆17Updated 7 months ago
Alternatives and similar repositories for srs
Users that are interested in srs are comparing it to the libraries listed below
Sorting:
- ☆14Updated 8 months ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆11Updated last month
- This repository contains the companion code from the "All your tracing are belong to BPF" blog posts☆18Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- Linux kernel branches for confidential compute research☆17Updated last month
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated last year
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆12Updated last year
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 4 months ago
- ☆13Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- kAFL Fuzzer☆33Updated 2 months ago
- Linux Security Hardening for Confidential Compute☆66Updated 7 months ago
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Updated last month
- KVM Virtual Machine Introspection Library☆46Updated last year
- ☆90Updated last year
- Explore a live Linux kernel's memory using GDB