pietroborrello / RopGun
RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using hardware performance counters.
☆26Updated 5 years ago
Alternatives and similar repositories for RopGun:
Users that are interested in RopGun are comparing it to the libraries listed below
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆24Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- ☆52Updated 5 years ago
- ☆44Updated 7 years ago
- Stony Brook University CFI library☆21Updated 10 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 6 years ago
- Collection of DBI evasion techniques☆14Updated 2 years ago
- run AFL with pintool☆65Updated 4 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Updated 3 years ago
- ☆38Updated 4 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 3 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated 9 months ago
- ☆53Updated 4 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆101Updated 3 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆22Updated 5 years ago
- ☆28Updated 6 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ☆55Updated 2 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆78Updated 6 years ago
- Utilities for generating dynamic traces☆88Updated 2 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆120Updated 4 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- ☆35Updated 3 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆25Updated 8 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 3 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆22Updated last month
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆91Updated 6 years ago