PKU-ASAL / NoDropLinks
☆16Updated last year
Alternatives and similar repositories for NoDrop
Users that are interested in NoDrop are comparing it to the libraries listed below
Sorting:
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆26Updated last year
- ☆61Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated 2 years ago
- This repository is used to analysis the shared resources of different containers☆31Updated 11 months ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆27Updated last year
- This repository is used to store recording about papers and presentations readed.☆17Updated last year
- An standalone execution trace library built on DynamoRIO.☆22Updated 3 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆73Updated 2 months ago
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆24Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆37Updated 10 months ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 4 years ago
- A tool for automatically identifying syscall-guard variables☆35Updated 4 months ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆47Updated 2 years ago
- ☆13Updated 3 years ago
- ☆14Updated last year
- ☆17Updated last year
- ☆93Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 3 years ago
- ☆28Updated 4 months ago
- ☆18Updated 10 months ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆36Updated last year
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆13Updated 2 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- A list of data-only attacks☆19Updated last month
- The scalable bug search for binaries☆69Updated 8 years ago
- ☆25Updated 3 years ago
- ☆12Updated 3 years ago
- Practical Data-Only Attack Generation☆41Updated last year
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆23Updated 10 months ago