A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber
☆156May 10, 2017Updated 8 years ago
Alternatives and similar repositories for Control-Flow-Integrity
Users that are interested in Control-Flow-Integrity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- A bootloader imgdata unpacker for Nexus 4, 5 and 7 smartphones as well as imgdata tool for Nexus 5.☆27Aug 5, 2017Updated 8 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆21Dec 12, 2022Updated 3 years ago
- Notes on various topics I'm interested in☆162Mar 16, 2026Updated last month
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Dec 9, 2015Updated 10 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 10 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- Sth in Control-Flow Integrity☆19Dec 25, 2018Updated 7 years ago
- Semantic Binary Code Analysis Framework☆125Sep 28, 2015Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆35Nov 26, 2018Updated 7 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- An open source, multi-architecture ROP compiler written in python☆163Jun 14, 2017Updated 8 years ago
- Dynamic instrumentation of the Linux kernel☆42Apr 24, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 9 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- capstone based disassembler for extracting to binnavi☆230Jun 8, 2016Updated 9 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 10 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- OS X malloc introspection tool☆321Oct 14, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 10 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- bil verification tool☆12Jun 30, 2022Updated 3 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆167May 10, 2018Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆307Jan 12, 2023Updated 3 years ago