gebi / teach-seccompLinks
Using simple seccomp filters
☆26Updated 13 years ago
Alternatives and similar repositories for teach-seccomp
Users that are interested in teach-seccomp are comparing it to the libraries listed below
Sorting:
- ☆65Updated 4 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- Test case minimizer for afl-fuzz☆26Updated 8 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- ☆37Updated 4 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Code samples used for the blog post☆24Updated 8 years ago
- fuzzing framework based on libfuzzer and clang sanitizer☆167Updated 6 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Updated 4 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 8 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆26Updated 5 years ago
- ☆81Updated 8 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- ☆27Updated 8 years ago
- ☆96Updated 6 years ago
- Tasteless CTF 2019☆20Updated 6 years ago
- ☆54Updated 6 years ago
- ☆55Updated 3 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆126Updated 5 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- WTF are those magic numbers?!!☆33Updated 3 years ago
- ☆37Updated 3 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 7 years ago