Re-randomizing the memory layout of a process at runtime
☆21May 28, 2016Updated 9 years ago
Alternatives and similar repositories for RuntimeASLR
Users that are interested in RuntimeASLR are comparing it to the libraries listed below
Sorting:
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- Slicing tool for c++ programs using clang AST.☆18Mar 8, 2021Updated 4 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- DARPA Cyber Grand Challenge Linux source code☆17Jul 9, 2015Updated 10 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- ☆12May 6, 2020Updated 5 years ago
- Anti Hacking Team TrustedBSD module☆27Sep 25, 2014Updated 11 years ago
- tiny embedded MIPS virtualization platform - a very small and lean hypervisor using MIPS R5 hardware VZ option for embedded systems (IoT …☆20Sep 26, 2023Updated 2 years ago
- Scripts for detecting Duqu drivers and other elements☆20Nov 10, 2011Updated 14 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Nov 5, 2021Updated 4 years ago
- Buffer overflow testbed, research paper published at ACSAC 2011☆93Aug 9, 2017Updated 8 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- A toy implementation of 'Stack Guard' on top of the LLVM compiler toolchain☆24Jul 1, 2017Updated 8 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 7 years ago
- DMon Prototype for OSDI 2021 Artifact Evaluation☆24May 4, 2021Updated 4 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Feb 5, 2017Updated 9 years ago
- ☆27Sep 5, 2025Updated 5 months ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆23Jul 1, 2022Updated 3 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- ☆26Oct 13, 2015Updated 10 years ago
- Project FlowCog (2017)☆27Aug 23, 2018Updated 7 years ago
- ☆26Sep 20, 2019Updated 6 years ago
- ☆34Mar 31, 2019Updated 6 years ago
- Assorted pintools☆30Mar 30, 2020Updated 5 years ago
- The collection of all Python program from various CTF's☆26Oct 11, 2015Updated 10 years ago
- ☆24Sep 26, 2017Updated 8 years ago
- Identifying and Explaining Similarities in Android Apps☆28Jul 28, 2018Updated 7 years ago
- ☆37May 19, 2023Updated 2 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- simple VM crackme demo☆31Jul 13, 2016Updated 9 years ago
- Papers on reverse engineering and assembly language programming☆38Dec 25, 2020Updated 5 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- BinSourcerer☆92Mar 1, 2022Updated 4 years ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago