lkrg-org / lkrgLinks
Linux Kernel Runtime Guard
☆474Updated last week
Alternatives and similar repositories for lkrg
Users that are interested in lkrg are comparing it to the libraries listed below
Sorting:
- A tool for checking the security hardening options of the Linux kernel☆1,933Updated last month
- Tracking CVEs for the linux Kernel☆749Updated last year
- Containers for building the Linux kernel or other software with many different compilers☆226Updated 3 weeks ago
- Vault Exploit Defense☆129Updated 11 months ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆234Updated 3 months ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆450Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆239Updated last year
- Linux Kernel hooking engine (x86)☆359Updated 8 months ago
- Linux kernel source tree (Kernel Self Protection Project)☆87Updated 6 months ago
- SELinux Policy Analysis Tools☆186Updated 3 months ago
- SELinux Reference Policy v2☆339Updated this week
- Linux kernel configs for popular distros.☆53Updated 3 weeks ago
- Linux Kernel Hacking☆729Updated last year
- The SELinux Notebook☆645Updated last month
- Libtpms-based TPM emulator with socket, character device, and Linux CUSE interface.☆689Updated last week
- UEFI shim loader☆977Updated last week
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆241Updated 2 weeks ago
- Arbitrary Speculative Code Execution with Return Instructions☆162Updated last year
- out-of-tree kernel {module, exploit} development tool☆231Updated 8 months ago
- Go-based tools for modifying UEFI firmware☆337Updated 7 months ago
- 📡🐧 Linux kernel syscall implementation tracker☆219Updated 4 months ago
- An easy way to virtualize the running system☆349Updated last year
- Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separati…☆550Updated this week
- Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than m…☆643Updated 3 weeks ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,209Updated 8 months ago
- Tear the firmware apart with your bare hands;-)☆193Updated 3 weeks ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆53Updated 2 weeks ago
- Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than m…☆428Updated 2 years ago
- Linux kernel exploitation experiments☆282Updated 3 weeks ago
- ☆369Updated 6 months ago