☆27Apr 27, 2022Updated 3 years ago
Alternatives and similar repositories for Cross-Language-Attacks
Users that are interested in Cross-Language-Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 11, 2020Updated 5 years ago
- ☆61Feb 15, 2023Updated 3 years ago
- ☆13Apr 13, 2023Updated 2 years ago
- A fully automated Rust fuzz driver generator☆62Jun 17, 2025Updated 9 months ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆39Aug 30, 2022Updated 3 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆91Sep 18, 2025Updated 6 months ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- A additional Rust compiler pass to detect memory safe bugs of Rust programs.☆17Dec 28, 2023Updated 2 years ago
- ☆16Nov 13, 2023Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Nov 10, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)…☆27Jul 31, 2024Updated last year
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- Two-Level Collaborative Fuzzing for Python Runtimes☆19Nov 25, 2023Updated 2 years ago
- ☆21Nov 14, 2024Updated last year
- ☆26Sep 21, 2022Updated 3 years ago
- Porting xv6-riscv on k210☆21May 4, 2021Updated 4 years ago
- This is a static analysis project for analyzing Rust programs.☆141Mar 15, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆10Jan 3, 2023Updated 3 years ago
- A framework for large scale analysis of the Rust ecosystem.☆37Mar 15, 2026Updated last week
- programmatic binary patching using ptrace☆14Aug 9, 2025Updated 7 months ago
- ☆26Oct 5, 2016Updated 9 years ago
- Converts cargo check (and clippy) JSON output to the GitHub Action error format☆13Jun 17, 2024Updated last year
- ☆11Nov 14, 2024Updated last year
- ☆38Feb 15, 2022Updated 4 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆92May 12, 2022Updated 3 years ago
- hypervisorなmemo☆13Jul 1, 2019Updated 6 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- ☆11Nov 27, 2021Updated 4 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- This is just an excerpt from the concepts found in the book "Clean Code" by Robert C. Martin☆22Feb 16, 2020Updated 6 years ago