A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnerability across heterogeneous devices.
☆31Nov 4, 2023Updated 2 years ago
Alternatives and similar repositories for RapidPatch
Users that are interested in RapidPatch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆29Dec 16, 2022Updated 3 years ago
- ☆18Apr 29, 2026Updated 2 weeks ago
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆28Dec 11, 2023Updated 2 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆15Sep 10, 2024Updated last year
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Feb 21, 2024Updated 2 years ago
- ☆19Sep 7, 2025Updated 8 months ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆40Nov 14, 2024Updated last year
- -☆11Dec 18, 2022Updated 3 years ago
- Several examples of anomaly detection algorithms for time series data.☆16Nov 20, 2024Updated last year
- ☆26Nov 16, 2023Updated 2 years ago
- Tests for verifying compliance of RMM implementations☆23Apr 28, 2026Updated 3 weeks ago
- caijiqhx notes☆16Oct 26, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The published code repo for the Cortex-M SoK paper.☆27Feb 5, 2026Updated 3 months ago
- ☆23Apr 7, 2022Updated 4 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Nov 10, 2020Updated 5 years ago
- https://rs3lab.github.io/SynCord/☆26Nov 23, 2022Updated 3 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 7 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆62May 20, 2025Updated 11 months ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆25Jul 1, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆42Feb 26, 2023Updated 3 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Aug 7, 2021Updated 4 years ago
- ☆25Jun 2, 2024Updated last year
- An example of iptables-bpf with Go+eBPF☆17Dec 16, 2021Updated 4 years ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated 2 years ago
- ☆11Feb 25, 2023Updated 3 years ago
- ARM CCA support for QEMU. Check wiki for instructions. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆30Apr 15, 2023Updated 3 years ago
- ☆63Oct 17, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆22Aug 23, 2022Updated 3 years ago
- bash script and modified java program to headlessly use ghidra's decompiler☆59Mar 28, 2022Updated 4 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- ☆20Sep 25, 2017Updated 8 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Example BPF program with LSM hooks☆36Feb 24, 2021Updated 5 years ago