Control-Flow Integrity implementation for the Linux Kernel 3.19
☆22Feb 19, 2020Updated 6 years ago
Alternatives and similar repositories for kcfi
Users that are interested in kcfi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- LSM BPF module to block pwnkit (CVE-2021-4034) like exploits☆21Feb 17, 2022Updated 4 years ago
- This rap optimizations and hl_cfi have be merged in hardenedlinux/linux-unofficial_grsec☆17Oct 3, 2019Updated 6 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆46Aug 25, 2021Updated 4 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 6 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- A collection of various exploits☆29Sep 17, 2024Updated last year
- Safe wrappers for VFIO☆15Nov 30, 2021Updated 4 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- This repository contains the hardware design source files of the Hex Five X300 RISC-V SoC. The X300 is Hex Five's official reference HW p…☆32Jan 23, 2024Updated 2 years ago
- Alcatraz project for Black Hat USA 2021☆78Aug 5, 2021Updated 4 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- ☆21Apr 15, 2022Updated 3 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 3 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- ☆11Apr 16, 2019Updated 6 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- Spectre exploit☆54Jan 9, 2018Updated 8 years ago
- RISC-V Tools (GNU Toolchain, ISA Simulator, Tests)☆23May 9, 2019Updated 6 years ago
- ☆14May 8, 2017Updated 8 years ago