kevinkoo001 / ropfLinks
Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack
☆26Updated 9 years ago
Alternatives and similar repositories for ropf
Users that are interested in ropf are comparing it to the libraries listed below
Sorting:
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆28Updated 12 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆94Updated 7 years ago
- ☆45Updated 7 years ago
- IDA plugin for software complexity metrics assessment☆60Updated 7 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago
- A system to record malware using PANDA☆44Updated 6 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- REIL translation library☆36Updated 9 years ago
- An Extensible Dynamic Analysis Framework for IoT Devices☆21Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- ☆88Updated 10 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 9 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- TaintAll, a taint analysis and concolic execution tool☆32Updated 8 years ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- ☆49Updated 3 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- ☆49Updated 8 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago