dbrumley / recfi
A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao
☆18Updated 9 years ago
Alternatives and similar repositories for recfi:
Users that are interested in recfi are comparing it to the libraries listed below
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆67Updated 11 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 7 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- ☆28Updated 2 years ago
- ☆63Updated 9 years ago
- covFuzz☆34Updated 7 years ago
- Python concolic execution framework for program analysis☆65Updated 10 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- A "general-purpose" tracing tool☆38Updated 9 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 5 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆45Updated 2 years ago
- ☆26Updated 9 years ago
- Malamute is a fuzzing toolkit initially developed to aid with regression-test based fuzzing of language interpreters☆26Updated 9 years ago
- MCFI/PICFI tool chain☆42Updated last year
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- XED based Disassembly Engine☆19Updated 6 years ago
- ☆25Updated 6 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated 2 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆33Updated 3 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- ☆24Updated 8 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Updated 9 years ago