jyao1 / edk2Links
EDK II
☆11Updated last year
Alternatives and similar repositories for edk2
Users that are interested in edk2 are comparing it to the libraries listed below
Sorting:
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆25Updated 9 years ago
- GrSecurity and PaX Patches Before End of Public Release☆65Updated 7 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Updated 9 years ago
- Dynamic binary translation framework for instrumenting the Linux kernel and its modules☆78Updated 8 years ago
- ☆73Updated 5 years ago
- Interactive Virtual Machine Introspection☆18Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- Corpus of crypto formats☆12Updated 3 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 8 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- rune - radare2 based symbolic emulator☆27Updated 8 years ago
- System tracer implementation in Rust☆32Updated 9 years ago
- Support UEFI load☆11Updated 10 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- Code to fuzz bignum libraries☆46Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- The Bear Operating System☆24Updated 8 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆131Updated 3 years ago
- Picon☆39Updated 8 years ago
- Tracks runtime instruction execution in Linux programs☆36Updated 12 years ago
- USB man in the middle linux kernel driver☆21Updated 4 years ago
- Lab Mouse Security research pertaining to RISC-V☆11Updated 8 years ago
- Memory forensics of virtualization environments☆48Updated 11 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- IPE is a Linux Security Module (LSM), which allows for a configurable policy to enforce integrity requirements on the whole system. IPE b…☆67Updated 2 months ago
- an open source toolkit for PCI bus exploration☆72Updated 9 years ago
- Documentation☆28Updated last month
- free crypto audit☆31Updated 8 years ago