open-education-hub / essentials-securityLinks
Security Summer School: Security Essentials Track
☆32Updated last year
Alternatives and similar repositories for essentials-security
Users that are interested in essentials-security are comparing it to the libraries listed below
Sorting:
- Questions + answers for the SO interview exam☆88Updated this week
- Security Summer School, Binary track☆29Updated 7 months ago
- Security Summer School, Web track☆26Updated 2 weeks ago
- Teaching resources (OER) for Operating Systems☆70Updated last year
- An index page to all of the homework from the university on this account.☆11Updated 2 years ago
- The front page and documentation for the Unikraft Open-Source Project.☆35Updated 3 months ago
- Reference implementation of Arm-CCA RMM specification☆68Updated last week
- Artifacts, including experiments and graphs, for the paper: "Unikraft: Fast, Specialized Unikernels the Easy Way" (EuroSys'21 - Best Pape…☆28Updated 4 years ago
- An ongoing attempt to create own hypervisior from scratch in linux.☆51Updated 4 years ago
- Adelie's source code☆12Updated 3 years ago
- ☆170Updated 11 months ago
- ☆16Updated 5 months ago
- Learning exercises for CHERI☆21Updated 5 months ago
- ☆119Updated 3 years ago
- Microscope: Enabling Microarchitectural Replay Attacks☆20Updated 5 years ago
- Wasp: micro-hypervisor that enables lightweight, isolated virtines☆19Updated 2 years ago
- Unikraft Google Summer of Code☆14Updated 2 months ago
- Examples for: Learning KVM - implement your own kernel☆379Updated 2 years ago
- Fuzzing Secure Monitor Implementations☆17Updated last year
- simple bare-metal armv8 (aarch64) hypervisor☆21Updated 3 years ago
- Student Starter Code for Secure Hardware Design at MIT☆83Updated last year
- Reverse Engineering CTF Writeups☆24Updated 4 months ago
- Repository public IOCLA☆22Updated last week
- Website and PoC collection for transient execution attacks☆200Updated last year
- ☆93Updated 2 months ago
- ☆39Updated 2 weeks ago
- A utility for decoding aarch64 ESR register values.☆100Updated this week
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated 2 years ago
- Getting Started with the Core Slicing Prototype☆14Updated 2 years ago
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Updated 4 years ago