Stars
Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called trust domains (TDs). Intel TDX is designed to isolate VMs fr…
Linux kernel branches for confidential compute research
Linux Security Hardening for Confidential Compute
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
🦜🔗 The platform for reliable agents.
Build resilient language agents as graphs.
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
A library OS for Linux multi-process applications, with Intel TDX support (experimental)
CrossSim: accuracy simulation of analog in-memory computing
Authenticator generates 2-Step Verification codes in your browser.
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Develo…
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Proxy server to bypass Cloudflare protection
The Linux Kernel Module Programming Guide (updated for 5.0+ kernels)
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Repo for counting stars and contributing. Press F to pay respect to glorious developers.
A library OS for Linux multi-process applications, with Intel SGX support