intel / ikgt-manifestLinks
ikgt manifest
☆42Updated 3 years ago
Alternatives and similar repositories for ikgt-manifest
Users that are interested in ikgt-manifest are comparing it to the libraries listed below
Sorting:
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- Microcode parser for AMD, Intel, and VIA processors☆134Updated 9 years ago
- Picon☆39Updated 8 years ago
- ☆86Updated 8 years ago
- Run any command transparently in a VM (this repo isn't part of Cappsule)☆27Updated 8 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- Simple Driver code for vmlaunch☆160Updated 8 years ago
- ☆71Updated 5 years ago
- The CloudProxy Tao for Trustworthy Computing☆37Updated 8 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆186Updated 3 years ago
- Trust Zone Project☆21Updated 10 years ago
- GRand Unified Bootloader http://www.gnu.org/software/grub/grub.html☆38Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- A forked and hardened version of PartitionAlloc from Chrome's Blink engine☆64Updated 7 years ago
- Firmware analysis gone wild.☆41Updated 11 years ago
- Sandboxing framework based on SECCOMP☆51Updated 7 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- ELF binary patching utility☆41Updated 9 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 7 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆207Updated last year
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- JEFF file format tools☆27Updated 9 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Experimental version of QEMU with basic support for ARM TrustZone (security extensions)☆84Updated 11 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆221Updated 3 years ago
- Interactive Virtual Machine Introspection☆18Updated 8 years ago