tklengyel / xenLinks
☆11Updated last year
Alternatives and similar repositories for xen
Users that are interested in xen are comparing it to the libraries listed below
Sorting:
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Updated 11 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- Some tools☆10Updated 7 years ago
- Fuzzer☆43Updated 10 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Updated 11 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Microsoft Edge MemGC Internals☆17Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- Rootkit☆22Updated 10 years ago
- REIL translation library☆36Updated 9 years ago
- Linux rootkit experimentations☆19Updated 10 years ago
- ☆32Updated last year
- S2E Core Engine Library☆15Updated 5 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- ☆15Updated 5 years ago
- ☆24Updated 10 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Updated 12 years ago
- ☆28Updated 3 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Updated 7 years ago
- ☆15Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- Fetch and set configuration values from IDAPython scripts☆24Updated 5 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 10 years ago