PKU-ASAL / NoDropLinks
☆16Updated 11 months ago
Alternatives and similar repositories for NoDrop
Users that are interested in NoDrop are comparing it to the libraries listed below
Sorting:
- ☆61Updated 3 years ago
- This repository is used to analysis the shared resources of different containers☆30Updated 9 months ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆26Updated last year
- A tool for automatically identifying syscall-guard variables☆34Updated 2 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆68Updated last month
- An standalone execution trace library built on DynamoRIO.☆22Updated 3 years ago
- ☆28Updated 3 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 4 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆36Updated 8 months ago
- ☆92Updated last year
- ☆13Updated 3 years ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆45Updated 2 years ago
- ☆15Updated 2 years ago
- ☆14Updated last year
- This repository is used to store recording about papers and presentations readed.☆17Updated last year
- Awesome materials for software supply chain security☆18Updated 5 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- ☆79Updated 3 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆24Updated 2 years ago
- ☆12Updated 3 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- 国科大软件安全原理作业☆25Updated 4 years ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆13Updated 2 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆22Updated 2 years ago
- ☆22Updated 5 years ago
- ☆90Updated last year
- z3 solver 学习☆51Updated 2 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆35Updated last year