☆16Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for adversarial-papers
Users that are interested in adversarial-papers are comparing it to the libraries listed below
Sorting:
- ☆12Jun 8, 2021Updated 4 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Aug 11, 2021Updated 4 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Jul 19, 2021Updated 4 years ago
- Reverse proxy for ultra-low latency streaming☆31May 30, 2024Updated last year
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- The tutorial of HuggingFace transformers.☆16Aug 14, 2022Updated 3 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Nov 24, 2021Updated 4 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆93Jan 19, 2022Updated 4 years ago
- This repository contains the hardware, software, and OS support for the Programmable Hardware Monitor (PHMon).☆27Aug 10, 2020Updated 5 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- SUPA☆28Jan 15, 2026Updated last month
- VBA analysis tools☆25Aug 15, 2025Updated 6 months ago
- Recover mutation graph from an AFL seed☆60Jan 6, 2021Updated 5 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- A regression greybox fuzzer aflchurn☆67May 19, 2022Updated 3 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 6 years ago
- Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing☆33Mar 25, 2021Updated 4 years ago
- Resources About Dynamic Binary Instrumentation and Dynamic Binary Analysis☆138Mar 4, 2020Updated 5 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- autofz: Automated Fuzzer Composition at Runtime☆84Sep 13, 2023Updated 2 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆31May 18, 2017Updated 8 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- ☆78Jun 13, 2022Updated 3 years ago
- Linux integrity monitoring for CentOS/RHEL☆12May 13, 2020Updated 5 years ago
- A memory allocator that aims to eliminate dangling pointer vulnerabilities at a low overhead, using virtualisation via Dune. My Computer …☆10Nov 27, 2019Updated 6 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago