☆16Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for adversarial-papers
Users that are interested in adversarial-papers are comparing it to the libraries listed below
Sorting:
- ☆12Jun 8, 2021Updated 4 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆65Aug 11, 2021Updated 4 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆28Aug 10, 2020Updated 5 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 10 months ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Jul 19, 2021Updated 4 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆94Jan 19, 2022Updated 4 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Reverse proxy for ultra-low latency streaming☆31May 30, 2024Updated last year
- ☆25Jun 16, 2021Updated 4 years ago
- Windows binaries for mickael9's script that extracts contents from BitRock installers.☆12Apr 18, 2021Updated 4 years ago
- VBA analysis tools☆25Aug 15, 2025Updated 7 months ago
- Mirror of http://git.cweiske.de/indieauth-openid.git/☆13Mar 5, 2023Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Nov 24, 2021Updated 4 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- autofz: Automated Fuzzer Composition at Runtime☆84Sep 13, 2023Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Recover mutation graph from an AFL seed☆60Jan 6, 2021Updated 5 years ago
- Resources About Dynamic Binary Instrumentation and Dynamic Binary Analysis☆138Mar 4, 2020Updated 6 years ago
- ☆12Apr 23, 2021Updated 4 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- A Superstatic service for HTTP proxying of AJAX requests.☆16Apr 18, 2016Updated 9 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- ☆11Aug 24, 2023Updated 2 years ago
- FakeLua is a subset of Lua JIT.☆12Updated this week
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- Recursively extract urls from a web page for reconnaissance.☆12Jun 9, 2024Updated last year
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- url string utility☆14Sep 12, 2022Updated 3 years ago