subgraph / go-seccomp
Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.
☆12Updated 9 years ago
Alternatives and similar repositories for go-seccomp:
Users that are interested in go-seccomp are comparing it to the libraries listed below
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆27Updated 8 years ago
- A wrapper for dd☆20Updated 8 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Go seccomp parser and compiler☆53Updated 7 years ago
- ☆66Updated 9 years ago
- ☆30Updated 9 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Memory awesomeness.☆29Updated 10 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 10 years ago
- MapGuard is a library that enforces a security policy for mmap based page allocations.☆21Updated 2 months ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Chrome extension for blocking x-origin cookies☆10Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- ☆24Updated 9 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- Code samples that correctly check the remote server's SSL certificate☆24Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 5 months ago
- Passive Bitcoin Project☆9Updated 9 years ago