HexHive / mitiGate
Benchmark to test different stop the exploit mitigations
☆18Updated 6 years ago
Alternatives and similar repositories for mitiGate:
Users that are interested in mitiGate are comparing it to the libraries listed below
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- ☆53Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆36Updated 5 years ago
- ☆17Updated 4 years ago
- experiments for IJON☆12Updated 5 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆33Updated 5 years ago
- ☆24Updated 6 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆16Updated 7 years ago
- ☆71Updated 5 years ago
- ROP Benchmark is a tool to compare ROP compilers☆41Updated 2 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- The parser-directed Fuzzer☆38Updated 4 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 9 years ago
- S2E plugins library☆17Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- ☆31Updated 4 years ago
- ☆16Updated 6 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆16Updated 7 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- A framework for control-flow recovery in binary programs.☆10Updated 6 years ago
- Dynamic Control Flow Recovery☆24Updated 7 years ago