☆27Apr 27, 2022Updated 3 years ago
Alternatives and similar repositories for Cross-Language-Attacks
Users that are interested in Cross-Language-Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 11, 2020Updated 5 years ago
- ☆62Feb 15, 2023Updated 3 years ago
- ☆13Apr 13, 2023Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆40Aug 30, 2022Updated 3 years ago
- SFI verifier of Wasm binaries☆83Mar 22, 2023Updated 3 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆91Sep 18, 2025Updated 6 months ago
- Symbolic Execution Over Processor Traces☆128Aug 14, 2024Updated last year
- A additional Rust compiler pass to detect memory safe bugs of Rust programs.☆17Dec 28, 2023Updated 2 years ago
- ☆16Nov 13, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆27Jul 18, 2024Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Nov 10, 2025Updated 5 months ago
- ShadowBound: Efficient Memory Protection through Advanced Metadata Management and Customized Compiler Optimization (USENIX Security 2024)…☆27Jul 31, 2024Updated last year
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- ☆21Nov 14, 2024Updated last year
- Porting xv6-riscv on k210☆21May 4, 2021Updated 4 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Validate semantic equivalence between C++ and Rust LLVM IR using State-Of-The-Art Verification☆14Dec 11, 2024Updated last year
- PVSS & Scrape in rust☆11Apr 6, 2026Updated last week
- programmatic binary patching using ptrace☆14Aug 9, 2025Updated 8 months ago
- Converts cargo check (and clippy) JSON output to the GitHub Action error format☆14Jun 17, 2024Updated last year
- ☆26Oct 5, 2016Updated 9 years ago
- ☆11Nov 14, 2024Updated last year
- ☆39Feb 15, 2022Updated 4 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- ☆46Oct 20, 2025Updated 5 months ago
- hypervisorなmemo☆13Jul 1, 2019Updated 6 years ago
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- ☆11Nov 27, 2021Updated 4 years ago
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago