☆13Oct 17, 2021Updated 4 years ago
Alternatives and similar repositories for shard
Users that are interested in shard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Apr 9, 2022Updated 4 years ago
- ☆21Updated this week
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆40Nov 14, 2024Updated last year
- ☆20Mar 10, 2022Updated 4 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 6 years ago
- ☆25Jun 2, 2024Updated last year
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆26Sep 5, 2021Updated 4 years ago
- Silm your kernel with better configuration.☆40May 3, 2024Updated 2 years ago
- A container engine from scratch in C language, without any LXC or Docker☆18Jun 17, 2022Updated 3 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 5 years ago
- ☆25May 10, 2021Updated 5 years ago
- ☆12Apr 23, 2021Updated 5 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆37Jun 1, 2022Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 6 years ago
- SyzScope is a research project that aims to reveal high-risk security bug from Syzbot. Learn more details in our paper.☆24Nov 17, 2021Updated 4 years ago
- Seattle Testbed's Repy ("Restricted Python") sandbox, version 2☆15Sep 17, 2025Updated 8 months ago
- ☆20Jun 13, 2022Updated 3 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆64Sep 4, 2019Updated 6 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆21Feb 19, 2020Updated 6 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- This repository contains the nested kernel implementation as it was built for the ASPLOS 2015 paper, including the FreeBSD prototype Pers…☆56Jul 7, 2017Updated 8 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆57May 24, 2022Updated 3 years ago
- Open-source implementation of the CUDA API.☆13May 5, 2012Updated 14 years ago
- Unofficial LLVM/Clang/LLD WebAssembly packages☆37Mar 1, 2026Updated 2 months ago
- ☆73Dec 5, 2019Updated 6 years ago
- ☆20Jun 7, 2025Updated 11 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆14Sep 19, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- AES-based random number generator in C☆11Apr 27, 2015Updated 11 years ago
- ☆13Oct 22, 2020Updated 5 years ago
- Welcome to the Lind sandbox monorepo! See our docs below:☆21May 14, 2026Updated last week
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆23Aug 30, 2019Updated 6 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 8 months ago
- Fork of wasmtime for protoyping WASIp3 work and coordination, not intended for any production use case, purely for development☆27Aug 12, 2025Updated 9 months ago
- ☆12Aug 13, 2014Updated 11 years ago