airbus-seclab / c-compiler-securityLinks
Security-related flags and options for C compilers
☆195Updated 2 years ago
Alternatives and similar repositories for c-compiler-security
Users that are interested in c-compiler-security are comparing it to the libraries listed below
Sorting:
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆200Updated 4 years ago
- A list of compiler warning flags for different GCC and clang versions☆64Updated last month
- Static instrumentation tool for efficient binary-level coverage analysis.☆149Updated 4 years ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆381Updated last year
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- Kernel Test Framework☆145Updated 8 months ago
- A framework for instrumenting build tools☆89Updated 3 weeks ago
- Self-hosting binary instrumentation framework for security research☆217Updated 2 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆175Updated 5 years ago
- ☆252Updated 2 years ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆122Updated last week
- clang-based search engine for C/C++ data structures, classes, prototypes & macros☆103Updated 2 months ago
- a friendly wrapper around ptrace☆133Updated 3 years ago
- Docs and resources on CPU Speculative Execution bugs☆376Updated 7 years ago
- estimate peak virtual memory use☆18Updated 6 months ago
- A fuzzing introspection tool☆167Updated 5 years ago
- A differential fuzzer for x86 decoders☆251Updated 11 months ago
- LKRG bypass methods☆73Updated 5 years ago
- Explore a live Linux kernel's memory using GDB☆117Updated 2 years ago
- Load-time selective binary rewriting☆162Updated 3 years ago
- ☆407Updated 2 weeks ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆130Updated 3 years ago
- Easy-to-use tool which autogenerates a type-aware fuzzer from a debuggable executable.☆23Updated 2 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆171Updated last year
- A Dolev-Yao-model-guided fuzzer for TLS☆143Updated this week
- ☆57Updated last year
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆196Updated 2 years ago
- Kernel-based debugger for Linux applications☆74Updated 3 years ago
- Rewriting functions in compiled binaries using McSema☆90Updated 6 years ago
- Code examples for the talk Secure Coding Practices in C++☆52Updated last year