airbus-seclab / c-compiler-securityLinks
Security-related flags and options for C compilers
☆198Updated 3 years ago
Alternatives and similar repositories for c-compiler-security
Users that are interested in c-compiler-security are comparing it to the libraries listed below
Sorting:
- A list of compiler warning flags for different GCC and clang versions☆71Updated 4 months ago
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆202Updated 4 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆72Updated last year
- Kernel Test Framework☆149Updated last month
- Static instrumentation tool for efficient binary-level coverage analysis.☆151Updated 4 years ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆385Updated 3 weeks ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆126Updated this week
- ☆253Updated 2 years ago
- Kernel-based debugger for Linux applications☆75Updated 3 years ago
- Self-hosting binary instrumentation framework for security research☆217Updated 2 years ago
- a friendly wrapper around ptrace☆134Updated 3 years ago
- A differential fuzzer for x86 decoders☆258Updated last year
- An event driven multi-core process debugging, tracing, and manipulation framework.☆175Updated 6 years ago
- A framework for instrumenting build tools☆90Updated last month
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- Peter's Amazing Syntax Tree Analyzer☆133Updated 2 months ago
- ☆64Updated last year
- A dynamic control flow graph (CFG) reconstruction plugin for valgrind.☆130Updated 5 months ago
- Load-time selective binary rewriting☆164Updated 3 years ago
- clang-based search engine for C/C++ data structures, classes, prototypes & macros☆103Updated 5 months ago
- ☆70Updated last year
- Determine which CPU architecture is used in a binary file.☆125Updated 10 months ago
- Docs and resources on CPU Speculative Execution bugs☆376Updated 7 years ago
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆195Updated 3 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- Safely execute an arbitrary x86 instruction☆203Updated last year
- Why fuzzing with emulators is amazing☆141Updated 5 years ago
- LKRG bypass methods☆73Updated 6 years ago
- Python command-line tool and GDB extension to view and save x86, ARM and objdump assembly files as control-flow graph (CFG) pdf files☆82Updated last year