cjdelisle / return-to-abort
return-to-abort() - Using code introspection to prevent stack-smashing
☆37Updated 4 years ago
Alternatives and similar repositories for return-to-abort:
Users that are interested in return-to-abort are comparing it to the libraries listed below
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- A forked and hardened version of PartitionAlloc from Chrome's Blink engine☆62Updated 7 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- 60 artisanal compiler crashes☆39Updated 8 years ago
- Enable piping of internal command output to external commands☆71Updated 6 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- A Genetic File, Syscall and Network Fuzzer.☆59Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Rewrite C/C++/Obj-C to Annotate Points of Interest☆27Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- strings for a Linux process' address space☆51Updated 11 years ago
- exokernel style operating system based on lightweight virtual machines☆25Updated 8 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated 10 months ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- Run any command transparently in a VM (this repo isn't part of Cappsule)☆27Updated 7 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Updated 4 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- an open source toolkit for PCI bus exploration☆70Updated 8 years ago
- ☆20Updated 9 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- Picon☆39Updated 7 years ago
- free crypto audit☆31Updated 7 years ago
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- ☆18Updated 8 years ago
- ☆85Updated 7 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 4 years ago