lkrg-org / lkrgLinks
Linux Kernel Runtime Guard
☆555Updated 2 weeks ago
Alternatives and similar repositories for lkrg
Users that are interested in lkrg are comparing it to the libraries listed below
Sorting:
- A tool for checking the security hardening options of the Linux kernel☆2,011Updated last week
- Containers for building the Linux kernel or other software with many different compilers☆254Updated 3 weeks ago
- Tracking CVEs for the linux Kernel☆752Updated last year
- Linux kernel configs for popular distros.☆59Updated 2 months ago
- UEFI shim loader☆1,025Updated 4 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆242Updated last year
- Vault Exploit Defense☆127Updated last year
- Libtpms-based TPM emulator with socket, character device, and Linux CUSE interface.☆737Updated 3 weeks ago
- Linux Kernel hooking engine (x86)☆384Updated 2 months ago
- SELinux Reference Policy v2☆359Updated 2 weeks ago
- Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules☆243Updated 7 months ago
- Linux kernel source tree (Kernel Self Protection Project)☆90Updated 10 months ago
- The SELinux Notebook☆695Updated 2 months ago
- The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)☆257Updated last week
- Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than m…☆679Updated 2 weeks ago
- Go-based tools for modifying UEFI firmware☆349Updated 3 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- Linux Kernel Hacking☆748Updated last year
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆465Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆490Updated 2 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,250Updated last year
- Quickly build and run kernels inside a virtualized snapshot of your live system☆690Updated this week
- Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separati…☆570Updated last week
- ebpfkit is a rootkit powered by eBPF☆823Updated 2 years ago
- Simple Linux seccomp rules without writing any code☆514Updated 5 months ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆60Updated 2 months ago
- A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29☆675Updated last year
- io_uring based rootkit☆244Updated 8 months ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆167Updated last year
- ☆328Updated 2 years ago