tklengyel / xenLinks
☆11Updated last year
Alternatives and similar repositories for xen
Users that are interested in xen are comparing it to the libraries listed below
Sorting:
- Rootkit☆23Updated 10 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- 🐧 A simple kernel-level rootkit☆21Updated 9 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆23Updated 7 years ago
- ☆32Updated last year
- S2E Core Engine Library☆15Updated 5 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 10 years ago
- ☆15Updated 5 years ago
- Packed Malware Analyzer (PACKMAN)☆12Updated 9 years ago
- Linux rootkit experimentations☆19Updated 10 years ago
- ☆26Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆27Updated 3 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 11 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Some tools☆10Updated 7 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Updated 11 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- ☆14Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- ☆30Updated 8 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 11 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago