☆27Apr 27, 2022Updated 3 years ago
Alternatives and similar repositories for Cross-Language-Attacks
Users that are interested in Cross-Language-Attacks are comparing it to the libraries listed below
Sorting:
- ☆14Jun 11, 2020Updated 5 years ago
- ☆61Feb 15, 2023Updated 3 years ago
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- programmatic binary patching using ptrace☆13Aug 9, 2025Updated 6 months ago
- ☆13Apr 13, 2023Updated 2 years ago
- A fully automated Rust fuzz driver generator☆62Jun 17, 2025Updated 8 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Nov 10, 2025Updated 3 months ago
- ☆16Nov 13, 2023Updated 2 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- ☆11Nov 27, 2021Updated 4 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆21Nov 14, 2024Updated last year
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆38Aug 30, 2022Updated 3 years ago
- A additional Rust compiler pass to detect memory safe bugs of Rust programs.☆17Dec 28, 2023Updated 2 years ago
- Cryfind is a tool to help you find crypto signatures in binary.☆36Oct 19, 2021Updated 4 years ago
- ☆26Jul 18, 2024Updated last year
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- A list of data-only attacks☆21Aug 22, 2025Updated 6 months ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)…☆27Jul 31, 2024Updated last year
- Bugs in Pods: Understanding Bugs in Container Runtime Systems (ISSTA 2024)☆19Aug 4, 2024Updated last year
- My challenges for AIS3 pre-exam 2019 and MyFirstCTF 2019☆21Jun 16, 2019Updated 6 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- Two-Level Collaborative Fuzzing for Python Runtimes☆19Nov 25, 2023Updated 2 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- CVE-2023-40477 PoC by Wild-Pointer☆24Aug 30, 2023Updated 2 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- Porting xv6-riscv on k210☆20May 4, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- ☆26Sep 21, 2022Updated 3 years ago
- poc code for CVE-2024-38080☆30Sep 1, 2024Updated last year
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- ☆43Oct 20, 2025Updated 4 months ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- A framework for large scale analysis of the Rust ecosystem.☆37Updated this week