subgraph / oz
OZ: a sandboxing system targeting everyday workstation applications
☆432Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for oz
- A public database for software and firmware hashes☆215Updated 8 years ago
- Subgraph Application Firewall☆104Updated 6 years ago
- The "Intel x86 considered harmful" paper☆195Updated 8 years ago
- Pond☆912Updated 2 years ago
- Unofficial forward ports of the last publicly available grsecurity patch☆150Updated 6 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆232Updated 8 years ago
- Qubes component: antievilmaid☆145Updated 3 months ago
- A secure application sandbox built with modern Linux sandboxing features - no longer actively developed, but still works fine, use bubble…☆293Updated 8 years ago
- Subgraph OS Handbook☆118Updated 7 years ago
- Quantum Insert detector/recorder☆305Updated 4 years ago
- Open Database of Firmware Test Results☆150Updated 8 years ago
- opmsg message encryption☆750Updated last year
- An XMPP client with OTR support☆365Updated 2 years ago
- ☆283Updated 8 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- Sandboxed Execution Environment☆815Updated 4 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆668Updated 2 years ago
- Deprecated - MIG Memory Forensic library☆388Updated 2 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆248Updated 5 years ago
- Haka runtime☆445Updated 7 years ago
- Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than m…☆402Updated last year
- A modern GNU/Linux firewall for GNOME☆390Updated 6 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 3 years ago
- A lightweight sandbox tool for non-root users☆658Updated 6 years ago
- INTERLOCK - file encryption and HSM front-end☆299Updated last month
- Use a TPM to store a TOTP token in order to attest boot state to another device☆204Updated last year