puppetlabs / libwhereamiLinks
Library to report hypervisor information from inside a VM
☆15Updated 4 months ago
Alternatives and similar repositories for libwhereami
Users that are interested in libwhereami are comparing it to the libraries listed below
Sorting:
- ☆7Updated 8 years ago
- Utility to determine if ELF binary is built with debug sections☆9Updated 3 years ago
- ☆12Updated 7 years ago
- Some cool game hacks☆21Updated 7 years ago
- x86 emulator with DOS [unofficial mirror]☆10Updated 9 months ago
- UEFI SLIC injector alternate method☆19Updated 8 years ago
- AHA! badge designs☆16Updated last year
- Graphics library in C++ for make keygen, patch, loader, etc.☆11Updated 10 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Updated 6 years ago
- Command-line privilege elevation for Windows☆23Updated 8 years ago
- ☆16Updated 7 years ago
- BIOS-based boot menu and loader☆16Updated 8 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 3 years ago
- FireEgl's PuTTY - FuTTY!☆18Updated 9 years ago
- Simpe C tool to analyze x86 binary for used instructions set☆14Updated 6 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Updated 9 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Updated 3 years ago
- System tracer implementation in Rust☆32Updated 8 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- Authenticated Blowfish-encrypted pipe☆23Updated 7 years ago
- Hypervisor-base File Monitoring : monitoring file-related activities in VMs on XEN hypervisor☆9Updated 7 years ago
- ☆7Updated 11 years ago
- Windows NT Internal Structure☆5Updated 9 years ago
- A Linux based Windows compatible user mode kernel☆58Updated 15 years ago
- Windows KExec☆25Updated 15 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- ☆29Updated 6 years ago
- Undefined Behaviour Snippets☆17Updated 8 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago