kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse
☆13Aug 21, 2017Updated 8 years ago
Alternatives and similar repositories for krx
Users that are interested in krx are comparing it to the libraries listed below
Sorting:
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Jun 10, 2017Updated 8 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆142Sep 19, 2018Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- ☆37Jun 1, 2022Updated 3 years ago
- Compartmentalization using hardware and software techniques.☆12Aug 28, 2025Updated 6 months ago
- A function invocation framework for Python☆11Feb 21, 2024Updated 2 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- OrientDB Module for Play! framework☆24Aug 4, 2013Updated 12 years ago
- GitHub Action to add reviewer(s) to a pull request.☆12Apr 23, 2024Updated last year
- A Modified gem5 for Simulating Virtualized Systems☆11Mar 1, 2015Updated 11 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆30Jan 2, 2026Updated 2 months ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Backup of old Subversion repo☆11Oct 22, 2019Updated 6 years ago
- c语言实现的能在windows和linux下运行的http服务器,支持动态页面☆11Jul 18, 2016Updated 9 years ago
- LEO Satellite vs. Cellular Networks: Exploring the Potential for Synergistic Integration (CoNEXT '23)☆11Oct 26, 2023Updated 2 years ago
- Illustrations of codeql's AST☆12Sep 10, 2021Updated 4 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- Symmetric JavaScript☆13Jul 12, 2017Updated 8 years ago
- High-level library for executable binary file analysis☆16Feb 13, 2017Updated 9 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 6 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- ☆11May 7, 2015Updated 10 years ago
- HOL Guidebook☆12Oct 11, 2024Updated last year
- ☆20Jun 25, 2013Updated 12 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- Library wrapper and system-level tracing utilities☆47Feb 22, 2017Updated 9 years ago
- AES-based random number generator in C☆11Apr 27, 2015Updated 10 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago