☆27Nov 30, 2024Updated last year
Alternatives and similar repositories for KernelSnitch
Users that are interested in KernelSnitch are comparing it to the libraries listed below
Sorting:
- ☆22Aug 5, 2025Updated 6 months ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- ☆12Apr 1, 2025Updated 11 months ago
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆33Jan 3, 2026Updated last month
- A virtio layer for xv6☆12Apr 16, 2019Updated 6 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- My public talks☆14Oct 1, 2024Updated last year
- ☆20Oct 24, 2024Updated last year
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 7 months ago
- ☆16Apr 6, 2023Updated 2 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- is a random text generator based on context-free grammars, it uses a EBNF for grammar definitions.☆18May 5, 2025Updated 9 months ago
- Tool for inferring cache replacement policies with automata learning. Uses LearnLib and Sketch.☆16Apr 21, 2020Updated 5 years ago
- ☆16Jul 28, 2022Updated 3 years ago
- Collections of patterns for weggli to find nice bugs☆21Nov 30, 2023Updated 2 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆21May 17, 2022Updated 3 years ago
- AES-128 and DES differential fault analysis☆16Jan 20, 2021Updated 5 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 3 years ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆81Oct 15, 2025Updated 4 months ago
- Performance Counter Measurements at the cycle granularity☆18Jul 9, 2021Updated 4 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- Backend development stack for agents☆29Jul 30, 2025Updated 7 months ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- A simple golang reverse engineering ida plugin☆19Dec 16, 2020Updated 5 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆25Jun 11, 2021Updated 4 years ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆30Jun 24, 2025Updated 8 months ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- ☆35Feb 4, 2026Updated 3 weeks ago
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆32Jul 2, 2025Updated 8 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆60Feb 20, 2026Updated last week
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆27Nov 30, 2023Updated 2 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- EFI bootkit for loading unsigned drivers☆37Jun 28, 2024Updated last year
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- uacatcher open source repo☆22Jul 22, 2023Updated 2 years ago
- ☆63Dec 31, 2025Updated 2 months ago