Benchmark to test different stop the exploit mitigations
☆18Jan 8, 2019Updated 7 years ago
Alternatives and similar repositories for mitiGate
Users that are interested in mitiGate are comparing it to the libraries listed below
Sorting:
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated last year
- ☆22Nov 12, 2020Updated 5 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 5 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Feb 1, 2019Updated 7 years ago
- low-level Capstone system bindings for Rust☆13Feb 15, 2019Updated 7 years ago
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Jul 7, 2022Updated 3 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Rust Bindings to interact with SMTLIB2 compliant solvers☆17Jun 3, 2019Updated 6 years ago
- ☆15Jan 24, 2016Updated 10 years ago
- A fuzzer setup to fuzz libc functions.☆16Aug 30, 2022Updated 3 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- ☆16Apr 15, 2019Updated 6 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- ☆17Apr 18, 2019Updated 6 years ago
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Oct 31, 2022Updated 3 years ago
- Android-Syscall-Logger☆22Feb 28, 2021Updated 5 years ago
- Runtime type and bounds-error checking for C/C++☆107Dec 18, 2024Updated last year
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>☆68Feb 2, 2017Updated 9 years ago
- Counterexample-Driven Genetic Programming☆18Jun 11, 2022Updated 3 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆17Oct 19, 2023Updated 2 years ago
- MapGuard is a library that enforces a security policy for mmap based page allocations.☆21Dec 14, 2025Updated 2 months ago
- ☆20May 27, 2020Updated 5 years ago
- User programs for rCore OS☆19Jun 7, 2022Updated 3 years ago