RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using hardware performance counters.
☆27Sep 10, 2019Updated 6 years ago
Alternatives and similar repositories for RopGun
Users that are interested in RopGun are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Feb 17, 2020Updated 6 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Feb 3, 2021Updated 5 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 7 months ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 3 years ago
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago
- Code and Data for AisaCCS 2018 paper: Hardware Performance Counters Can Detect Malware: Myth or Fact?☆23Feb 20, 2026Updated last month
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆97Aug 22, 2018Updated 7 years ago
- Proof-of-concept for the ZombieLoad and RIDL attacks☆29May 26, 2019Updated 6 years ago
- z64 Simulator☆19Nov 26, 2024Updated last year
- Lecture notes for Advanced Operating Systems and Virtualization course at Sapienza University of Rome☆22Mar 8, 2019Updated 7 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆88Mar 13, 2023Updated 3 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Nov 3, 2025Updated 4 months ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆136May 14, 2021Updated 4 years ago
- Qiling Advanced Binary Emulation framework☆23Apr 4, 2020Updated 5 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆94Jan 6, 2026Updated 2 months ago
- Ghidra Emulates Functions☆57Oct 13, 2020Updated 5 years ago
- 📄Source code variable naming using a seq2seq architecture☆10Mar 19, 2020Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- ☆42Aug 4, 2020Updated 5 years ago
- Exploits backed up from http://1337day.com in the 2011☆20Jan 27, 2021Updated 5 years ago
- Security introduction book☆23Jan 10, 2016Updated 10 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆65Aug 11, 2021Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Anti-ransomware in linux, Decoy, Protect file, Protect drectory, Auto backup☆25Feb 12, 2023Updated 3 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Misc llvm patches☆23Jul 17, 2021Updated 4 years ago
- Safe Rust bindings to the DynamoRIO dynamic binary instrumentation framework.☆21Mar 8, 2025Updated last year
- Towards Sound Reassembly of Modern x86-64 Binaries (ASPLOS'25)☆20Apr 1, 2025Updated 11 months ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Extract and generate code based on name and type for mig func/arg/request&reply member etc, ideal helper for creating monitor, tracker, f…☆19Jun 5, 2018Updated 7 years ago