jiezhoucs / must-readView external linksLinks
Lists of must-read papers (mainly security papers)
☆32Sep 18, 2024Updated last year
Alternatives and similar repositories for must-read
Users that are interested in must-read are comparing it to the libraries listed below
Sorting:
- Implementation of Tagged Memory security policies into Rocket Core☆10Nov 8, 2016Updated 9 years ago
- Type qualifiers for C☆16Sep 21, 2011Updated 14 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- ☆37May 15, 2022Updated 3 years ago
- Secure Virtual Architecture☆42Apr 12, 2019Updated 6 years ago
- Benchmark for memory store throughput☆23Jun 22, 2021Updated 4 years ago
- ☆22Jun 17, 2022Updated 3 years ago
- Pre-built bitcode files for the Linux kernel☆22Sep 18, 2019Updated 6 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- ☆74Dec 5, 2019Updated 6 years ago
- Fuzzing Parsers with Tokens☆33Jan 14, 2021Updated 5 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Jun 25, 2018Updated 7 years ago
- ☆37Jun 1, 2022Updated 3 years ago
- light ifconfig☆14Apr 13, 2019Updated 6 years ago
- A list of AI autonomous agents in Web3☆10Jan 9, 2025Updated last year
- Overcooked! 2 TAS Development Framework☆10Aug 18, 2023Updated 2 years ago
- Semantic model for aspects of ELF static linking and DWARF debug information☆52Jul 20, 2025Updated 6 months ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- A toy LDAP server in C for illustrative purposes☆12Apr 6, 2011Updated 14 years ago
- LLVM trunk with poolalloc trunk modified to compile only DSA☆12Jul 9, 2015Updated 10 years ago
- ☆10Jan 31, 2022Updated 4 years ago
- ☆12Oct 13, 2022Updated 3 years ago
- Constraint solver based on abstract interpretation☆10Dec 20, 2024Updated last year
- Learn MLOps Tools in Arabic☆14May 21, 2024Updated last year
- A renderer for sheet diagrams in bimonoidal categories☆13Aug 28, 2021Updated 4 years ago
- llvm with tablegen backend for capstone disassembler☆52Jan 25, 2026Updated 3 weeks ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Oct 4, 2019Updated 6 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Oct 26, 2022Updated 3 years ago
- A (very) tiny IRC server, C-version, public domain☆14Apr 22, 2025Updated 9 months ago
- Simple & compliant implementation of common UNIX userspace utilities☆10Oct 23, 2024Updated last year
- Explore the history of word meanings.☆10Jan 16, 2026Updated 3 weeks ago
- ☆12Apr 1, 2025Updated 10 months ago
- FNV hash collision generator☆12Mar 2, 2017Updated 8 years ago
- IBM AIX 4.1.3 source code☆16Oct 12, 2021Updated 4 years ago
- A gopher daemon☆12May 16, 2022Updated 3 years ago
- a complete rewrite of wscript.exe, for *NIX☆13Nov 2, 2018Updated 7 years ago
- ☆11Jan 10, 2024Updated 2 years ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago