HexHive / datashieldLinks
☆17Updated 4 years ago
Alternatives and similar repositories for datashield
Users that are interested in datashield are comparing it to the libraries listed below
Sorting:
- ☆29Updated 7 years ago
- ☆24Updated 7 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- SUPA☆28Updated 5 years ago
- CRETE under development☆59Updated 5 years ago
- ☆17Updated 6 years ago
- MCFI/PICFI tool chain☆43Updated last year
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- ☆55Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- ☆37Updated 3 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆63Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆53Updated 6 years ago
- Configurable instrumentation of LLVM bitcode☆34Updated 6 months ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- ☆73Updated 5 years ago
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago
- A version of Griffin used to provide program traces☆15Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- ☆12Updated 4 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Updated 6 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 5 years ago
- Experimental translation of llvm to smt.☆58Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 5 years ago
- ☆18Updated 2 years ago