PathArmor context-sensitive CFI implementation
☆45Oct 26, 2015Updated 10 years ago
Alternatives and similar repositories for patharmor
Users that are interested in patharmor are comparing it to the libraries listed below
Sorting:
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated last year
- ☆22Nov 12, 2020Updated 5 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Stony Brook University CFI library☆22Sep 30, 2014Updated 11 years ago
- ☆19Mar 16, 2017Updated 8 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆31May 18, 2017Updated 8 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- ☆22Nov 16, 2023Updated 2 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- ☆55Mar 30, 2020Updated 5 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- SUPA☆28Jan 15, 2026Updated last month
- Secure Virtual Architecture☆42Apr 12, 2019Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- a Japanese food keeps you sane☆119Aug 22, 2015Updated 10 years ago
- Data and scripts for the paper "Polymorphic Type Inference for Machine Code"☆13Apr 12, 2016Updated 9 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Symbolic range analysis for LLVM.☆12Jan 10, 2016Updated 10 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- ☆11Aug 28, 2024Updated last year
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago