hardenedlinux / TraditionalMitigationLinks
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
☆21Updated 4 years ago
Alternatives and similar repositories for TraditionalMitigation
Users that are interested in TraditionalMitigation are comparing it to the libraries listed below
Sorting:
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 3 years ago
- ☆63Updated 6 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- Fast and efficient binary translator☆58Updated 6 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆109Updated 7 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- Dynamic binary translation framework for instrumenting the Linux kernel and its modules☆77Updated 7 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆218Updated 2 months ago
- Rewriting functions in compiled binaries using McSema☆90Updated 6 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 8 years ago
- ☆65Updated 4 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Updated 9 years ago
- a friendly wrapper around ptrace☆133Updated 3 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆95Updated this week
- ☆55Updated 3 years ago
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆151Updated 7 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- A linux system call fuzzer using TriforceAFL☆177Updated last year
- Some low-level stuff☆107Updated last year
- Fuzzers for the Linux kernel☆116Updated 8 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆137Updated 7 years ago
- ☆96Updated 6 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Updated 7 years ago