SUSE / clang-extractLinks
A tool to extract code content from source files using the clang and LLVM infrastructure.
☆21Updated 5 months ago
Alternatives and similar repositories for clang-extract
Users that are interested in clang-extract are comparing it to the libraries listed below
Sorting:
- Static Analyser for C☆117Updated last week
- libpulp enables live patching in user space applications.☆60Updated last month
- ☆32Updated this week
- Open-source release for MemSentry (EuroSys'17)☆47Updated 4 years ago
- ☆19Updated 3 years ago
- ☆35Updated 3 years ago
- Load-time selective binary rewriting☆158Updated 2 years ago
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel☆58Updated last year
- Explore a live Linux kernel's memory using GDB☆115Updated 2 years ago
- This is a read-only mirror of the kvm-unit-tests repository from https://gitlab.com/kvm-unit-tests/kvm-unit-tests. Pull requests here at …☆27Updated 2 weeks ago
- fuzzing framework based on libfuzzer and clang sanitizer☆167Updated 6 years ago
- Linux kernel source tree (Kernel Self Protection Project)☆86Updated 4 months ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆21Updated 3 years ago
- A collection of analysis tools for Kconfig and Kbuild constraints.☆51Updated last month
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆37Updated 6 months ago
- ☆16Updated 2 years ago
- A toolkit for building whole-program LLVM bitcode files☆77Updated 3 years ago
- Proof-of-concept implementation for the paper "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channel…☆26Updated last year
- Kernel-Mode-Linux☆24Updated 2 years ago
- Piecewise debloating toolchain☆15Updated 5 years ago
- Linux Security Hardening for Confidential Compute☆66Updated 8 months ago
- Pahole and the dwarves☆223Updated last month
- ☆13Updated 3 years ago
- An ongoing attempt to create own hypervisior from scratch in linux.☆49Updated 3 years ago
- ☆10Updated 3 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated 2 years ago
- ☆34Updated last year
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆61Updated 2 years ago
- ☆22Updated 4 years ago