Linux Kernel Runtime Guard
☆588Apr 13, 2026Updated this week
Alternatives and similar repositories for lkrg
Users that are interested in lkrg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vault Exploit Defense☆128Sep 7, 2024Updated last year
- A tool for checking the security hardening options of the Linux kernel☆2,062Feb 28, 2026Updated last month
- LKRG bypass methods☆74Jan 10, 2020Updated 6 years ago
- ugly code to check linux kernel memory and dump some internal structures☆48Nov 20, 2024Updated last year
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separati…☆580Apr 12, 2026Updated last week
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel virtual address layout…☆476Updated this week
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,264Dec 27, 2025Updated 3 months ago
- Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than m…☆705Mar 27, 2026Updated 3 weeks ago
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- Using ftrace for function hooking in Linux kernel☆298Mar 21, 2021Updated 5 years ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆58Updated this week
- ☆102Mar 8, 2022Updated 4 years ago
- awesome-linux-rootkits☆2,058Feb 15, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and gl…☆1,809Apr 9, 2026Updated last week
- ☆25May 10, 2021Updated 4 years ago
- Tracking CVEs for the linux Kernel☆750Apr 9, 2024Updated 2 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Aug 11, 2023Updated 2 years ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆685Jul 7, 2024Updated last year
- ☆16Jun 23, 2024Updated last year
- My proof-of-concept exploits for the Linux kernel☆1,574Sep 11, 2025Updated 7 months ago
- KernelMemorySanitizer, a detector of uses of uninitialized memory in the Linux kernel☆419Mar 5, 2026Updated last month
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- A fuzzer for full VM kernel/driver targets☆789Mar 28, 2026Updated 3 weeks ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,288Jan 29, 2026Updated 2 months ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆140Feb 28, 2023Updated 3 years ago
- ☆374Oct 30, 2025Updated 5 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆6,131Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,956Apr 7, 2024Updated 2 years ago
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,714Apr 6, 2026Updated last week
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- Linux Kernel Hacking☆755Apr 10, 2024Updated 2 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆151Feb 16, 2022Updated 4 years ago
- bouheki is KRSI(eBPF+LSM) based Linux security auditing tool.☆93Sep 21, 2025Updated 6 months ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year