open-education-hub / binary-securityLinks
Security Summer School, Binary track
☆29Updated 5 months ago
Alternatives and similar repositories for binary-security
Users that are interested in binary-security are comparing it to the libraries listed below
Sorting:
- BINSEC binary-level open-source platform☆370Updated 2 months ago
- A vulnerable C program for testing fuzzers.☆196Updated 2 years ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆232Updated 3 years ago
- Research paper collection for Linux kernel security from top security conferences.☆77Updated 7 years ago
- ☆167Updated 9 months ago
- Code and exercises for a workshop on z3 and angr☆230Updated 4 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆218Updated 3 months ago
- Old and new CTFs about Linux kernel exploitation.☆60Updated 3 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Updated 4 years ago
- Security Summer School, Web track☆26Updated 3 months ago
- SyzScope is a research project that aims to reveal high-risk security bug from Syzbot. Learn more details in our paper.☆24Updated 3 years ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆75Updated 2 years ago
- Useful tips by OTA CTF members☆147Updated 6 years ago
- A curated list of Grammar based fuzzing research papers, codes, tutorials☆125Updated 3 years ago
- FAUST Gameserver for attack-defense CTFs☆97Updated 3 weeks ago
- ☆52Updated 3 months ago
- Program analysis tools developed at Draper on the CBAT project.☆104Updated 2 years ago
- Kernel development & exploitation practice environment.☆238Updated 2 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆140Updated 4 years ago
- My write-ups from various CTFs☆117Updated last year
- Symbolic Program Slicing with LLVM☆84Updated 5 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆135Updated 4 years ago
- CTF writeups☆42Updated 3 years ago
- A tool for detecting Spectre vulnerabilities through fuzzing☆45Updated 4 years ago
- Reproduce CVEs from ForAllSecure Vulnerabilities Lab☆112Updated 2 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Updated 2 years ago
- Target-centric program analysis.☆77Updated this week
- A general way to Recover Safe linking protected value/pointer☆12Updated 2 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆155Updated 4 years ago