jyao1 / edk2Links
EDK II
☆11Updated last year
Alternatives and similar repositories for edk2
Users that are interested in edk2 are comparing it to the libraries listed below
Sorting:
- Support UEFI load☆11Updated 10 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- ☆73Updated 5 years ago
- The Bear Operating System☆24Updated 8 years ago
- Dynamic binary translation framework for instrumenting the Linux kernel and its modules☆78Updated 8 years ago
- System tracer implementation in Rust☆32Updated 9 years ago
- Corpus of crypto formats☆12Updated 3 years ago
- Interactive Virtual Machine Introspection☆18Updated 8 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- GrSecurity and PaX Patches Before End of Public Release☆65Updated 7 years ago
- ☆35Updated 3 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago
- Intel Kernel Guard Technology Core Repo☆56Updated last year
- Picon☆39Updated 8 years ago
- x86-64 kernel in Rust☆33Updated 9 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- rune - radare2 based symbolic emulator☆27Updated 8 years ago
- A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermi…☆78Updated 5 years ago
- ☆28Updated 7 years ago
- Traditional Mitigation in GCC to defend Memory Corruption Vulnerability☆22Updated 4 years ago
- ☆86Updated 8 years ago
- Secure Virtual Architecture☆42Updated 6 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- ☆25Updated 10 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆187Updated 3 years ago
- A tool to enable fuzzing for Spectre vulnerabilities☆31Updated 5 years ago
- Implementation of the SMM rootkit "The Watcher"☆131Updated 3 years ago
- Dynamic instrumentation of the Linux kernel☆41Updated 10 years ago