A binary hardening system
☆111Sep 30, 2023Updated 2 years ago
Alternatives and similar repositories for RedFat
Users that are interested in RedFat are comparing it to the libraries listed below
Sorting:
- A powerful static binary rewriting tool☆1,097Mar 3, 2026Updated 2 weeks ago
- ☆13Apr 9, 2022Updated 3 years ago
- AFL binary instrumentation☆307Jan 17, 2025Updated last year
- Runtime type and bounds-error checking for C/C++☆108Dec 18, 2024Updated last year
- ☆22Nov 12, 2020Updated 5 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- An awesome & curated list of binary rewriting papers☆263Apr 4, 2022Updated 3 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Jun 9, 2022Updated 3 years ago
- ☆61Jun 20, 2022Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Sep 3, 2022Updated 3 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Oct 18, 2022Updated 3 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 6 years ago
- A system call interception tool☆57Dec 9, 2024Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Oct 31, 2023Updated 2 years ago
- Apply ROP protection to a binary using binary rewriting with GTIRB☆34Jul 1, 2025Updated 8 months ago
- The fastest Intel-PT decoder for fuzzing☆378Feb 2, 2024Updated 2 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- ☆25May 27, 2025Updated 9 months ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆23Dec 10, 2025Updated 3 months ago
- POC about how to detect windows kernel debug by pool tag.☆13Nov 29, 2023Updated 2 years ago
- Tools to measure an app's App Sandbox usage☆26May 20, 2020Updated 5 years ago
- Rust bindings for googleprojectzero/TinyInst☆25Dec 3, 2025Updated 3 months ago
- ☆14Dec 10, 2021Updated 4 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆189Mar 26, 2022Updated 3 years ago
- Windows ABI Structured Exception Handling Tests☆50May 8, 2025Updated 10 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆199Mar 14, 2024Updated 2 years ago