nhfruchter / linux-tool-mapsLinks
Redesigns of linux tool maps
☆56Updated 9 years ago
Alternatives and similar repositories for linux-tool-maps
Users that are interested in linux-tool-maps are comparing it to the libraries listed below
Sorting:
- A public database for software and firmware hashes☆214Updated 8 years ago
- Chair and the Key☆64Updated 10 years ago
- Simple proof-of-concept for killing a hard-to-kill process☆44Updated 7 years ago
- ☆20Updated 9 years ago
- "What if I tossed small pox into a room filled with sprinters after filling their water cups with red bull."☆33Updated 10 years ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- The "State considered harmful" paper☆109Updated 9 years ago
- HTTP framework☆48Updated 8 years ago
- Wireshark-Specific Dissector Language☆198Updated 8 years ago
- Superfast Line Counter☆51Updated 4 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 5 years ago
- Various articles I've written☆116Updated 2 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- ☆288Updated 9 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆57Updated last year
- Open Database of Firmware Test Results☆150Updated 9 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 9 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Jump to Full Encryption☆61Updated 9 years ago
- Hintjens' book production tools☆46Updated 9 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆66Updated 7 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆151Updated 4 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 5 years ago
- repeatedly run programs until they break, and be ready to attach a debugger☆197Updated 7 years ago
- Inline C/asm in Bash☆252Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Pretty Curved Privacy☆122Updated 8 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆403Updated 4 years ago