HexHive / mitiGateLinks
Benchmark to test different stop the exploit mitigations
☆18Updated 6 years ago
Alternatives and similar repositories for mitiGate
Users that are interested in mitiGate are comparing it to the libraries listed below
Sorting:
- ☆17Updated 4 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- ☆24Updated 6 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- experiments for IJON☆12Updated 5 years ago
- ☆53Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆34Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆37Updated 6 years ago
- ☆17Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 9 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- ☆72Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆47Updated 8 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- ☆31Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- ☆28Updated 6 years ago
- ☆17Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆17Updated last year
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- ☆55Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆30Updated 3 years ago