airbus-seclab / c-compiler-security
Security-related flags and options for C compilers
☆189Updated 2 years ago
Alternatives and similar repositories for c-compiler-security:
Users that are interested in c-compiler-security are comparing it to the libraries listed below
- A list of compiler warning flags for different GCC and clang versions☆64Updated last month
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆198Updated 3 years ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆373Updated 9 months ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆145Updated 4 years ago
- Self-hosting binary instrumentation framework for security research☆212Updated last year
- ☆253Updated last year
- Load-time selective binary rewriting☆157Updated 2 years ago
- Kernel Test Framework☆141Updated 2 months ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆181Updated 3 years ago
- An LLVM sanitizer tutorial☆199Updated 2 years ago
- A framework for instrumenting build tools☆88Updated 4 months ago
- Peter's Amazing Syntax Tree Analyzer☆129Updated 6 months ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Compiler/source code fuzzing tool using AFL instrumentation☆124Updated 6 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆66Updated last year
- Fuzzing Embedded Systems using Hardware Breakpoints☆182Updated last year
- Kernel-based debugger for Linux applications☆73Updated 3 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆173Updated 5 years ago
- ☆69Updated 9 months ago
- NoVT is a compiler-based defense against vtable hijacking in C++ programs. It compiles C++ programs without using vtables.☆50Updated 2 years ago
- estimate peak virtual memory use☆18Updated 2 weeks ago
- A static checker for identifying unstable code.☆361Updated 9 years ago
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆191Updated 2 years ago
- Information about Linux system calls on different architectures☆156Updated last week
- Arbitrary Speculative Code Execution with Return Instructions☆158Updated last year
- Explore a live Linux kernel's memory using GDB☆114Updated 2 years ago
- Rewriting functions in compiled binaries using McSema☆88Updated 5 years ago
- Safely execute an arbitrary x86 instruction☆180Updated last year
- A deterministic, fuzzable pthread implementation☆37Updated last year
- Determine which CPU architecture is used in a binary file.☆116Updated last month