Control-Flow Integrity implementation for the Linux Kernel 3.19
☆22Feb 19, 2020Updated 6 years ago
Alternatives and similar repositories for kcfi
Users that are interested in kcfi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- kCFI Documentation☆15Apr 18, 2017Updated 8 years ago
- ☆25Jun 2, 2024Updated last year
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- ☆13Apr 9, 2022Updated 4 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- LSM BPF module to block pwnkit (CVE-2021-4034) like exploits☆21Feb 17, 2022Updated 4 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- This rap optimizations and hl_cfi have be merged in hardenedlinux/linux-unofficial_grsec☆17Oct 3, 2019Updated 6 years ago
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆46Aug 25, 2021Updated 4 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 6 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Mar 5, 2018Updated 8 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- ☆22Nov 12, 2020Updated 5 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of various exploits☆29Sep 17, 2024Updated last year
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated 2 years ago
- Safe wrappers for VFIO☆15Nov 30, 2021Updated 4 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- This repository contains the hardware design source files of the Hex Five X300 RISC-V SoC. The X300 is Hex Five's official reference HW p…☆32Jan 23, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Sep 29, 2022Updated 3 years ago
- Alcatraz project for Black Hat USA 2021☆78Aug 5, 2021Updated 4 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- ☆21Mar 28, 2026Updated 2 weeks ago
- CVE-2022-3910☆13Mar 14, 2023Updated 3 years ago