PathArmor context-sensitive CFI implementation
☆46Oct 26, 2015Updated 10 years ago
Alternatives and similar repositories for patharmor
Users that are interested in patharmor are comparing it to the libraries listed below
Sorting:
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated 2 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Stony Brook University CFI library☆22Sep 30, 2014Updated 11 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- Data and scripts for the paper "Polymorphic Type Inference for Machine Code"☆13Apr 12, 2016Updated 9 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- SGX-Shield: Enabling Address Space Layout Randomization (ASLR) for SGX Programs☆49Apr 15, 2018Updated 7 years ago
- VTable Hijacking Protection for Binaries☆12Feb 28, 2017Updated 9 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- ☆55Mar 30, 2020Updated 5 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆31May 18, 2017Updated 8 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- ☆19Mar 16, 2017Updated 9 years ago
- ☆26Oct 13, 2015Updated 10 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- Buffer overflow testbed, research paper published at ACSAC 2011☆93Aug 9, 2017Updated 8 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Jul 7, 2022Updated 3 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- My dotfiles☆32Sep 9, 2024Updated last year
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- ☆11Aug 28, 2024Updated last year
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- Fast and efficient binary translator☆58Jan 17, 2019Updated 7 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago