kCFI Documentation
☆15Apr 18, 2017Updated 8 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- A pure-go implementation of the Axolotl Ratchet, extracted from pond☆21Feb 8, 2017Updated 9 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- pattern matching for python☆25May 12, 2009Updated 16 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 8 years ago
- ☆25Jun 2, 2024Updated last year
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- A curated collection of scripts for kernel-related devops☆13Nov 23, 2023Updated 2 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Raw BLE advertisement + sniffing tool (Linux)☆16Feb 5, 2024Updated 2 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Feb 14, 2025Updated last year
- ☆14Mar 29, 2026Updated last week
- ☆16Oct 4, 2012Updated 13 years ago
- x86 emulator by Golang☆13Jun 29, 2017Updated 8 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Plugins for pkg☆19Jun 6, 2020Updated 5 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- Analysis on Kernel Self-Protection: Understanding Security and Performance Implication☆18Apr 20, 2020Updated 5 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- ☆36Nov 12, 2019Updated 6 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- Adelie's source code☆12Mar 2, 2022Updated 4 years ago
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- Nintendo switch debugger for radare2☆13Aug 12, 2018Updated 7 years ago
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆18Aug 12, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- ☆17Apr 18, 2019Updated 6 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- ☆17Jan 14, 2026Updated 2 months ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Dec 1, 2017Updated 8 years ago
- Simple install script for Suricata/Zeek with JSON logging on FreeBSD☆18Apr 9, 2025Updated last year