hardenedlinux / TraditionalMitigationLinks
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
☆21Updated 4 years ago
Alternatives and similar repositories for TraditionalMitigation
Users that are interested in TraditionalMitigation are comparing it to the libraries listed below
Sorting:
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- ☆63Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Updated 8 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Updated 8 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Updated 9 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- Routines for hunting down kernel symbols.☆83Updated 14 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- ☆55Updated 3 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 3 years ago
- Seeding fuzzers with symbolic execution☆203Updated 8 years ago
- Fuzzers for the Linux kernel☆116Updated 9 years ago
- Fast and efficient binary translator☆58Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆219Updated 4 months ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆95Updated last month
- ☆65Updated 4 years ago
- Clang instrumentation module for tracing variable and buffer comparisons in C/C++ and saving the coverage data to .sancov files☆202Updated 6 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- a friendly wrapper around ptrace☆133Updated 3 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- A linux system call fuzzer using TriforceAFL☆176Updated last year
- ☆96Updated 6 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆107Updated 7 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆81Updated 6 years ago