puppetlabs / libwhereami
Library to report hypervisor information from inside a VM
☆15Updated last month
Alternatives and similar repositories for libwhereami:
Users that are interested in libwhereami are comparing it to the libraries listed below
- ☆7Updated 8 years ago
- Graphics library in C++ for make keygen, patch, loader, etc.☆11Updated 10 years ago
- Utility to determine if ELF binary is built with debug sections☆9Updated 2 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- FireEgl's PuTTY - FuTTY!☆18Updated 9 years ago
- Capstone Engine bindings on PHP 7.0+☆12Updated 2 years ago
- On-the-fly extraction of rar files being downloaded from a newsgroup/http, etc☆26Updated 7 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Updated 9 years ago
- Some cool game hacks☆21Updated 6 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆9Updated 5 years ago
- x86 emulator with DOS [unofficial mirror]☆10Updated 6 months ago
- ☆12Updated 7 years ago
- ☆7Updated 11 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Updated 6 years ago
- OFTC's branch of Hybrid IRCd☆25Updated last year
- ☆16Updated 7 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Simpe C tool to analyze x86 binary for used instructions set☆14Updated 6 years ago
- UEFI SLIC injector alternate method☆19Updated 8 years ago
- Command-line privilege elevation for Windows☆23Updated 8 years ago
- Library and tools to access the Extended File System☆17Updated 2 months ago
- Detect Malware with Sandbox/VM evasion and Anti-debugging skills with some heur☆10Updated 9 years ago
- Utility for dumping all the information Capstone has on given instructions.☆24Updated 3 years ago
- AHA! badge designs☆16Updated last year
- Old and probably outdated IDA plugins☆24Updated 8 years ago
- just give me a unix shell☆32Updated 2 years ago
- secure terminal logging☆17Updated 7 years ago
- A small tool for brute forcing the access code of a Yubico Yubikey.☆20Updated 4 years ago
- ☆9Updated 7 years ago
- Tools for testing C compilers for the correct handling of volatile objects.☆26Updated 10 years ago