Kernel programming: This is a simple kernel module implementation for enforcing access control policies using Linux Security Module framework.
☆32Apr 7, 2018Updated 7 years ago
Alternatives and similar repositories for Linux-Security-Module
Users that are interested in Linux-Security-Module are comparing it to the libraries listed below
Sorting:
- Coffer is a RISC-V trusted execution environment developed in Rust.☆20Mar 3, 2022Updated 4 years ago
- Proof-of-concept implementation for the paper "ThermalScope: A Practical Interrupt Side Channel Attack Based On Thermal Event Interrupts"…☆13Dec 17, 2024Updated last year
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- FPGA routing delay sensors for effective remote power analysis attacks☆13Aug 13, 2024Updated last year
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆12Sep 15, 2025Updated 6 months ago
- Easy to use cross platform network protocol (primarily developed for use in Droply)☆13Feb 14, 2021Updated 5 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- Something Temporary☆10Oct 18, 2018Updated 7 years ago
- 参考《Windows内核安全与驱动开发》的透明加密解密Minifilter☆75May 29, 2022Updated 3 years ago
- ☆13Jan 12, 2018Updated 8 years ago
- A PyGame hello-world for the Miyoo Mini☆15Jun 10, 2024Updated last year
- Streamline Covert Channel Attack (presented in ASPLOS'21)☆22Feb 18, 2021Updated 5 years ago
- simple C++ json library. (clone of kazuho/picojson)☆20Mar 10, 2022Updated 4 years ago
- simple privilege access control service☆26Jan 25, 2018Updated 8 years ago
- 带有详细注释的XV6源码☆10Dec 8, 2019Updated 6 years ago
- Simple Library calls tracer☆22Feb 19, 2018Updated 8 years ago
- ☆23May 21, 2024Updated last year
- gittup.org's binutils☆20Jan 6, 2017Updated 9 years ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated last year
- ☆36Feb 3, 2025Updated last year
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- Tools for putting custom ROMs on a Motorola Droid 4 (XT894)☆10Dec 8, 2020Updated 5 years ago
- The source code from the Writing Wayland clients book https://www.gitbook.com/book/bugaevc/writing-wayland-clients☆12Aug 23, 2017Updated 8 years ago
- ☆12Nov 27, 2019Updated 6 years ago
- 借用了网络上SevenZip的封装,简化了7z压缩解压代码,只支持了几种常见的格式cab,zip,7z. 生成dll400k+.☆22Nov 30, 2016Updated 9 years ago
- HarfBuzz text shaping engine☆12Updated this week
- Simple UDP tunnel☆30Sep 28, 2017Updated 8 years ago
- A script to check for common mistakes in LaTeX source files of scientific papers.☆35Aug 26, 2025Updated 6 months ago
- gamedll☆10May 11, 2017Updated 8 years ago
- A faithful port of the 32-bit xv6 learner's operating system to the Rust programming language☆19Oct 25, 2018Updated 7 years ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- Teo-ng - A Thomson TO8 Emulator☆12May 5, 2023Updated 2 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- python 实现的简单的 java 词法和语法分析☆12Jun 21, 2014Updated 11 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- 关闭恶意 驱动的文件和注册表保护☆14Jun 28, 2022Updated 3 years ago
- Victima is a new software-transparent technique that greatly extends the address translation reach of modern processors by leveraging the…☆32Oct 13, 2023Updated 2 years ago