Tiny project with that demonstrates how to enable Return Flow Guard
☆12Feb 7, 2017Updated 9 years ago
Alternatives and similar repositories for TinyReturnFlowGuard
Users that are interested in TinyReturnFlowGuard are comparing it to the libraries listed below
Sorting:
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- Sample programs that illustrate how to use Control Flow Guard, VS2015's control flow integrity implementation☆53Dec 27, 2016Updated 9 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- ghidra scripts☆15Feb 5, 2021Updated 5 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- The demo on Windows☆21Mar 6, 2016Updated 9 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- C definitions processor.☆22Feb 3, 2018Updated 8 years ago
- Analysis tools and exploit sample scripts for Adobe Reader 10/11 and Acrobat Reader DC☆79May 28, 2016Updated 9 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Jun 21, 2016Updated 9 years ago
- network pcap fuzzer☆21Jan 19, 2015Updated 11 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- A x86 systematic ROP payload generation☆57Feb 28, 2020Updated 6 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Test case minimizer for afl-fuzz☆27Jul 19, 2017Updated 8 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Jun 26, 2018Updated 7 years ago
- ☆39Oct 21, 2016Updated 9 years ago
- RHme+ 2015 challenge☆115Jun 7, 2016Updated 9 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago