lkrg-org / lkrgLinks
Linux Kernel Runtime Guard
☆526Updated last week
Alternatives and similar repositories for lkrg
Users that are interested in lkrg are comparing it to the libraries listed below
Sorting:
- Containers for building the Linux kernel or other software with many different compilers☆228Updated last month
- Tracking CVEs for the linux Kernel☆751Updated last year
- UEFI shim loader☆988Updated last month
- SELinux Reference Policy v2☆347Updated last week
- SELinux Policy Analysis Tools☆189Updated last week
- Linux kernel configs for popular distros.☆55Updated last month
- Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than m…☆652Updated last week
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆241Updated last year
- Vault Exploit Defense☆129Updated last year
- Linux Kernel hooking engine (x86)☆367Updated 9 months ago
- Linux kernel source tree (Kernel Self Protection Project)☆89Updated 8 months ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆457Updated last year
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆236Updated 5 months ago
- Libtpms-based TPM emulator with socket, character device, and Linux CUSE interface.☆699Updated this week
- Linux kernel exploitation experiments☆344Updated last month
- Linux Kernel Hacking☆737Updated last year
- An easy way to virtualize the running system☆351Updated last year
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆243Updated last week
- The SELinux Notebook☆666Updated 2 months ago
- Go-based tools for modifying UEFI firmware☆341Updated last month
- dracut the event driven initramfs infrastructure☆652Updated last week
- Quickly build and run kernels inside a virtualized snapshot of your live system☆653Updated last week
- Information about Linux system calls on different architectures☆168Updated this week
- Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separati…☆554Updated last week
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆55Updated 2 weeks ago
- 📡🐧 Linux kernel syscall implementation tracker☆224Updated 6 months ago
- Scripts to slightly improve the security of the Linux boot process with UEFI Secure Boot and TPM support☆282Updated 2 years ago
- KVM-based Virtual Machine Introspection☆350Updated 11 months ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆486Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆171Updated last year