gebi / teach-seccomp
Using simple seccomp filters
☆26Updated 12 years ago
Alternatives and similar repositories for teach-seccomp:
Users that are interested in teach-seccomp are comparing it to the libraries listed below
- Code samples used for the blog post☆24Updated 8 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Updated 2 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆25Updated 5 years ago
- ☆27Updated 6 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Belluminar 2016 Beijing stuff☆26Updated 8 years ago
- ☆26Updated 8 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago
- ☆63Updated 4 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Boring tool to launch multiple afl-fuzz instances☆50Updated 7 years ago
- Open-source release for MemSentry (EuroSys'17)☆46Updated 4 years ago
- ☆35Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 8 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 6 years ago
- A GCC plugin implementing various stack canaries.☆14Updated 12 years ago
- z3 scripts and ctf challenge solutions.☆24Updated 2 years ago
- ☆55Updated 2 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Updated 9 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- Test case minimizer for afl-fuzz☆26Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago