PKU-ASAL / NoDropLinks
☆16Updated last year
Alternatives and similar repositories for NoDrop
Users that are interested in NoDrop are comparing it to the libraries listed below
Sorting:
- This repository is used to analysis the shared resources of different containers☆31Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Updated 3 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆27Updated 2 years ago
- ☆28Updated 4 years ago
- ☆61Updated 3 years ago
- ☆12Updated 3 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆76Updated 2 months ago
- 国科大软件安全原理作业☆25Updated 5 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated 2 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆37Updated last year
- A tool for automatically identifying syscall-guard variables☆35Updated 7 months ago
- This repository is used to store recording about papers and presentations readed.☆17Updated last year
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆25Updated 2 years ago
- An standalone execution trace library built on DynamoRIO.☆23Updated 3 years ago
- ☆81Updated 4 years ago
- ☆13Updated 4 years ago
- ☆15Updated 2 years ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆47Updated 2 years ago
- ☆98Updated 2 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated last year
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 3 years ago
- fuzz the linux kernel bpf verifier☆83Updated 4 years ago
- some kernel exploit challenges and cve analysis☆26Updated 7 years ago
- ☆23Updated 6 years ago
- ☆18Updated 2 years ago
- ☆96Updated last year