☆56Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for xom-switch
Users that are interested in xom-switch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Apr 22, 2022Updated 4 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- ☆51Nov 15, 2021Updated 4 years ago
- ☆11Apr 23, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- Adelie's source code☆12Mar 2, 2022Updated 4 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- ☆79Aug 4, 2022Updated 3 years ago
- SUPA☆28Jan 15, 2026Updated 3 months ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- ☆25Jun 2, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Oct 25, 2019Updated 6 years ago
- Experimental setup of "Intel MPX explained"☆29Feb 4, 2020Updated 6 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- ☆38Feb 6, 2021Updated 5 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- RISC-V Security HC admin repo☆17Jan 7, 2025Updated last year
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 7 months ago
- Retypd plugin for Ghidra reverse engineering framework from NSA☆28Jul 6, 2023Updated 2 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆23Jul 30, 2016Updated 9 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆27Oct 19, 2018Updated 7 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆25Oct 4, 2018Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- ☆39Oct 21, 2016Updated 9 years ago
- ☆28Sep 5, 2025Updated 7 months ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆67Oct 4, 2022Updated 3 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆57May 24, 2022Updated 3 years ago