lorenzo-stoakes / linux-vm-hacksView external linksLinks
Hacks and experiments for the linux kernel VM subsystem.
☆23Jun 4, 2022Updated 3 years ago
Alternatives and similar repositories for linux-vm-hacks
Users that are interested in linux-vm-hacks are comparing it to the libraries listed below
Sorting:
- Notes taken from Understanding the Linux Virtual Memory Manager by Mel Gorman targeting kernel 2.4.22.☆66Jun 30, 2016Updated 9 years ago
- The Linux Scheduler Simulator☆12Dec 20, 2010Updated 15 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- A network interface for GDB for Linux Kernel☆73Aug 3, 2025Updated 6 months ago
- Course materials for the Data Science Specialization: https://www.coursera.org/specialization/jhudatascience/1☆10Jan 9, 2015Updated 11 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Examples for: Learning KVM - implement your own kernel☆380Sep 3, 2023Updated 2 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Firebase Functions ToDo sample with KotlinJS☆12May 3, 2018Updated 7 years ago
- CyanogenMod Linux Kernel☆13Sep 25, 2009Updated 16 years ago
- ☆11Apr 16, 2020Updated 5 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Utility tool to help digitally sign applications (binaries) on Windows.☆13Jun 8, 2015Updated 10 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- An Android app written using Jetpack Compose that helps you discover movies and make your watchlist☆12Oct 20, 2022Updated 3 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Data Science Course Materials - Fall 2014☆12Sep 6, 2014Updated 11 years ago
- the rounding error tool 🚩☆14May 16, 2025Updated 9 months ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- I built this project with Jetpack Compose and TheMovieDb API.☆10Aug 6, 2022Updated 3 years ago
- A renderer application which can, in combination with the sharebuffer module, display the contents drawn by SurfaceFlinger in an SDL wind…☆11Jul 19, 2016Updated 9 years ago
- Task Manager Extension for Windows☆13Jul 9, 2015Updated 10 years ago
- A Rust firmware for mechanical keyboards using the Teensy 3.2☆11Dec 15, 2018Updated 7 years ago
- Simple Robin Hood hash table implemented using C macros☆15Feb 7, 2025Updated last year
- ☆28Dec 28, 2025Updated last month
- AVR assembly plugin for Binary Ninja☆12Jun 6, 2018Updated 7 years ago