☆17Apr 18, 2019Updated 6 years ago
Alternatives and similar repositories for HexVASAN
Users that are interested in HexVASAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆103Apr 20, 2024Updated last year
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- ☆26Oct 13, 2015Updated 10 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated 2 years ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- Presentations, Videos, and Sample Source from Austin LLVM Meetups☆11Jul 23, 2020Updated 5 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- ☆18Jun 14, 2018Updated 7 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Feb 2, 2025Updated last year
- Inter-procedural analysis framework and dependency/information-flow analysis for LLVM☆19Mar 2, 2013Updated 13 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- Main goal of project is to reduce probability of key leaking from device. CKM stores symmetric and asymmetric keys and provides crypto op…☆15Jan 15, 2016Updated 10 years ago
- NoVT is a compiler-based defense against vtable hijacking in C++ programs. It compiles C++ programs without using vtables.☆50Sep 29, 2022Updated 3 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- IntFlow is an LLVM-based arithmetic error detection tool that combines static information flow tracking and dynamic program analysis☆16Apr 4, 2015Updated 10 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- A Windows memory instrumentation tool to track memory allocations and deallocations for long-running applications.☆14Jul 22, 2020Updated 5 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- ☆15May 6, 2021Updated 4 years ago
- ☆33Jan 14, 2026Updated 2 months ago
- A library for binary analysis and rewriting☆50Sep 28, 2023Updated 2 years ago
- moved to https://git.sr.ht/~lotheac/pf.vim☆10Jul 16, 2018Updated 7 years ago
- Runtime type and bounds-error checking for C/C++☆108Dec 18, 2024Updated last year
- MS-Fuzz data☆15Nov 5, 2022Updated 3 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆94Jan 19, 2022Updated 4 years ago