RSS 5 projects tagged "sandbox"

Download Website Updated 10 May 2013 Multi-Sandbox Lua Engine

Screenshot
Pop 41.38
Vit 1.00

Multi-Sandbox Lua Engine (MSLE) is a modified Lua interpreter which supports creation and maintenance of multiple "100% tight" sandboxes from within Lua. "100% tight" means that the amount of memory used by a sandbox (counting both code and data) is strictly limited, a feature Lua did not offer before.

No download No website Updated 14 Mar 2013 Sicuro

Screenshot
Pop 17.92
Vit 20.07

Sicuro is a whitelist-based sandbox for safely executing code written in the Ruby programming language. It does not use any operating system-specific features (such as chroots or jails), nor does it require anything besides a working Ruby (1.9+) installation and a few gems.

Download Website Updated 31 Dec 2011 pito

Screenshot
Pop 48.74
Vit 1.00

Pito is a set of C++0x header libraries to facilitate writing system call interceptor libraries based on LD_PRELOAD wrappers. The program "pito" is also provided for loading Unix commands with such wrappers. This system is capable of passing command line arguments to loaded plugins for easy configuration. Pito is supplied with a powerful system call sandbox library to prevent modifications to supplied filesystem locations and a system call logging library.

No download No website Updated 22 Mar 2010 System Call Virtualisation Layer

Screenshot
Pop 47.58
Vit 1.00

SVL (System Call Virtualisation Layer) is a C++ library that can be used to detect, abort, and rewrite system calls. The possible uses include, but are not limited to, studying the system call trace of a program; sandboxing a program to tighten security; or selectively rerouting system calls, such as file operations, to different paths or even different sytems to create distributed architectures. SVL allows you to change the low level constructs for system call invocation by allowing you access to both the registers and the target program's memory. As well as having the low level access, SVL has high level classes for dealing with the major syscall operation types.

No download Website Updated 12 Dec 2009 FBAC-LSM

Screenshot
Pop 21.31
Vit 1.00

FBAC-LSM is a security mechanism for Linux which retricts applications based on the features they provide, such as "Web Browser" or "Image Editor". By restricting the actions of applications, the damage which can be caused by malware or software vulnerabilities can be significantly reduced. Reusable policy abstractions, known as functionalities, can be used to grant the authority to perform high level features (for example using the Web_Browser functionality) or lower level features (such as using the HTTP_Client functionality) or to grant privileges to access any specified resources. Functionalities are parameterized, which allows them to be adapted to the needs of specific applications. Functionalities are also hierarchical; that is, functionalities can contain other functionalities.

Screenshot

Project Spotlight

GNU Wget

A network utility for downloading content from the Web.

Screenshot

Project Spotlight

MailWrap

A text filling and wrapping plugin for Apple Mail.