☆52Jun 15, 2022Updated 3 years ago
Alternatives and similar repositories for ffmalloc
Users that are interested in ffmalloc are comparing it to the libraries listed below
Sorting:
- Prototype allocator for the prevention of use-after-free attacks, as described in the S&P 2020 Paper - "MarkUs: Drop-in use-after-free pr…☆14Jan 14, 2022Updated 4 years ago
- ☆10May 12, 2023Updated 2 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- A 3d printed case design for Lichee Pi 4A☆11May 13, 2023Updated 2 years ago
- ☆67May 5, 2021Updated 4 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆38Jan 4, 2018Updated 8 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- ☆12Jul 3, 2018Updated 7 years ago
- Proof of concept trade simulation using state overrides☆23Sep 8, 2022Updated 3 years ago
- SSZ-compatible tree hash implementation optimised for speed and security☆23Feb 5, 2026Updated last month
- Hydra: an Extensible Fuzzing Framework for Finding Semantic Bugs in File Systems☆173Aug 8, 2022Updated 3 years ago
- AIL: The angr Intermediate Language.☆33May 28, 2025Updated 9 months ago
- ☆15Jul 2, 2023Updated 2 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- Port of original MemTest86+ v5.1 to other architectures (RISC-V for now)☆16Jan 26, 2020Updated 6 years ago
- My RV64 CPU (Work in progress)☆19Dec 22, 2022Updated 3 years ago
- ☆15Apr 8, 2025Updated 11 months ago
- toy implementation of bfv in rust☆27Apr 21, 2022Updated 3 years ago
- GN meta-build system parser, static code model and navigable code browser☆13Aug 8, 2022Updated 3 years ago
- This repo contains a RISC-V ISA extension (proposal) to allow recording of control transfer history to on-chip registers, to support usag…☆23Mar 10, 2026Updated last week
- A feedback-driven, evolutionary fuzzer for the CPython JIT compiler.☆22Mar 12, 2026Updated last week
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- libLISA: Instruction Discovery and Analysis on x86-64☆126Feb 21, 2025Updated last year
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- A framework to test the correctness of the Linux kernel patch.☆22Sep 29, 2023Updated 2 years ago
- ☆17Nov 24, 2020Updated 5 years ago
- CLI wrapper around ethers-rs to query the ethereum blockchain from the terminal☆20May 7, 2023Updated 2 years ago
- Tools for testing C compilers for the correct handling of volatile objects.☆31Jul 18, 2014Updated 11 years ago
- ☆13Apr 13, 2023Updated 2 years ago
- MioDB: Devouring Data Byte-addressable LSM-based KV Stores for Hybrid Memory☆18Jan 11, 2023Updated 3 years ago
- A simple allocator written in Rust that manages memory in fixed-size chunks.☆12Sep 29, 2024Updated last year
- CoreMark 1.0 ported to WebAssembly☆44Apr 2, 2021Updated 4 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- A hardware accelerated IP packet forwarder running on programmable ICs☆15Jan 21, 2023Updated 3 years ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆189Mar 26, 2022Updated 3 years ago
- CIDR union / subtraction☆14Mar 13, 2026Updated last week