cjdelisle / return-to-abortLinks
return-to-abort() - Using code introspection to prevent stack-smashing
☆37Updated 4 years ago
Alternatives and similar repositories for return-to-abort
Users that are interested in return-to-abort are comparing it to the libraries listed below
Sorting:
- 60 artisanal compiler crashes☆39Updated 9 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 3 years ago
- Enable piping of internal command output to external commands☆71Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- ikgt manifest☆42Updated 2 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆160Updated last year
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 8 years ago
- A forked and hardened version of PartitionAlloc from Chrome's Blink engine☆62Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Microcode parser for AMD, Intel, and VIA processors☆134Updated 9 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Constant-Time Toolkit☆296Updated 6 years ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆284Updated 3 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Various articles I've written☆116Updated 2 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- Simple Driver code for vmlaunch☆160Updated 7 years ago
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- SLAyer is an automatic formal verification tool that uses separation logic to verify memory safety of C programs.☆326Updated 9 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- The DrK Attack - Proof of concept☆345Updated 3 years ago
- Superfast Line Counter☆51Updated 4 years ago
- repeatedly run programs until they break, and be ready to attach a debugger☆194Updated 6 years ago
- A libre cross-platform disassembler.☆33Updated 7 years ago
- OUSPG Open - Summer of Buzz with Fresh Blood, Alumni and Affiliates☆20Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago