wdormann / panic_fsLinks
Filesystems that cause an OS panic
☆13Updated 5 years ago
Alternatives and similar repositories for panic_fs
Users that are interested in panic_fs are comparing it to the libraries listed below
Sorting:
- ☆13Updated 5 years ago
- Analyze the rbs files with python☆8Updated 7 years ago
- ☆70Updated 2 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆32Updated 2 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18Updated 5 years ago
- ☆27Updated 2 years ago
- Silly proof-of-concept for a PDF chatroom☆21Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Tools to measure an app's App Sandbox usage☆25Updated 5 years ago
- An experimental file formats playground☆87Updated 2 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- Minimal setup to trigger the xz backdoor☆28Updated 9 months ago
- A tool to help you understand TPM commands and responses.☆45Updated 8 months ago
- Detect patterns of bad behavior in function calls☆26Updated 5 years ago
- Qubes containerization on Windows☆130Updated 4 years ago
- Nice (ish) bindings for the EndpointSecurity framework on macOS for Rust.☆20Updated last year
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆146Updated 4 years ago
- Binary Protocol Differ☆119Updated 5 years ago
- Random experiments and shenanigans☆13Updated 2 months ago
- ☆9Updated last year
- ☆23Updated 10 months ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 2 months ago
- ☆18Updated 4 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆74Updated 3 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆14Updated last year
- The public release of LeftoverLocals code☆67Updated last year
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago