☆12Jul 26, 2022Updated 3 years ago
Alternatives and similar repositories for pku_exploit_files
Users that are interested in pku_exploit_files are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 面向项目版本差异性的漏洞识别技术研究☆14Mar 29, 2022Updated 4 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆28Aug 10, 2020Updated 5 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 6 years ago
- ☆10May 12, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 5 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- 一个可扩展的智能合约安全审计工具☆13Oct 13, 2020Updated 5 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- like ROP Defender☆10May 6, 2015Updated 11 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- ☆18Aug 15, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- practice-toy-wasm-vm-go☆11Apr 20, 2022Updated 4 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Multi-version glibc source browser based on code.woboq.org 's product.☆10Feb 27, 2020Updated 6 years ago
- ☆11Feb 19, 2023Updated 3 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Static Web page hosting☆15Feb 14, 2015Updated 11 years ago
- A demo about how to build a real compiler with LLVM libraries, write for the book https://github.com/tuoxie007/play_with_llvm☆10Apr 11, 2020Updated 6 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆25Jun 2, 2024Updated last year
- ☆10Apr 8, 2022Updated 4 years ago
- Rootkit。 进程监控。☆11Jul 19, 2016Updated 9 years ago
- ☆13Jan 12, 2018Updated 8 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- alternative reality☆18Mar 1, 2017Updated 9 years ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆12Jan 24, 2019Updated 7 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Jun 8, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- eBPF C programs injectable in a network card to extract packets' features for detecting different network attacks.☆14May 6, 2022Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆17Jul 12, 2021Updated 4 years ago
- ☆34Apr 7, 2022Updated 4 years ago
- 虚拟机带外内存监控☆14Mar 30, 2018Updated 8 years ago
- A small tool for quickly generating LLVM passes☆29Sep 22, 2025Updated 7 months ago
- 使用vt进行无痕hook,支持r3☆64Feb 1, 2019Updated 7 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago