Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
☆22Jun 22, 2021Updated 4 years ago
Alternatives and similar repositories for TraditionalMitigation
Users that are interested in TraditionalMitigation are comparing it to the libraries listed below
Sorting:
- Verified Boot for RPi3☆15Nov 16, 2021Updated 4 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- Modified qemu for binary-only kernel tracing, address sanitizer and so on☆19Jul 5, 2025Updated 7 months ago
- 😈 The Demon App Store☆30Aug 18, 2021Updated 4 years ago
- ☆35Jun 4, 2018Updated 7 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- headless-ida-mcp-server☆29Apr 4, 2025Updated 10 months ago
- hardenedlinux.org website☆32May 9, 2025Updated 9 months ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- ☆27Jun 17, 2025Updated 8 months ago
- Haskell Interface for getting overall system statistics☆16Feb 8, 2019Updated 7 years ago
- A LR(1) parser generator targeting C++17.☆13Jul 8, 2020Updated 5 years ago
- RequestExecutor for oatpp's ApiClient based on libcurl. Supports both Sync and Async APIs.☆12May 16, 2024Updated last year
- The kernel for the Wink Hub☆11Oct 29, 2014Updated 11 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- Easy WebSocket server and client library implemented using C++14 and Boost.Beast.☆14Sep 30, 2020Updated 5 years ago
- serverless version of zwei☆17Nov 5, 2021Updated 4 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- A library for developing languages with scoped binders (like forall or lambda).☆28Aug 21, 2018Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Code examples in Bad to the Bone book☆25Jun 7, 2013Updated 12 years ago
- Project Trellis database☆14Sep 15, 2025Updated 5 months ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- This module contains common packages for Contiamo projects written in Go☆10Jun 12, 2024Updated last year
- The framework for next generation data center.☆29Aug 24, 2025Updated 6 months ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Buildroot package repo☆11Feb 7, 2021Updated 5 years ago
- A library for genericly composing/lifting operations in a stack of monadic contexts☆16Jan 25, 2015Updated 11 years ago
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- Experimental MLIR based points-to analysis tool☆17Jan 21, 2026Updated last month
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago