PARTS / LLVM compiler
☆31Aug 14, 2019Updated 6 years ago
Alternatives and similar repositories for parts-llvm
Users that are interested in parts-llvm are comparing it to the libraries listed below
Sorting:
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆79Dec 30, 2021Updated 4 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- LLVM with SGX support☆13Feb 5, 2018Updated 8 years ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆125Mar 31, 2021Updated 4 years ago
- ☆37May 19, 2023Updated 2 years ago
- ☆21Apr 15, 2022Updated 3 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆17Oct 16, 2020Updated 5 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- An extendable and flexible infrastructure for program instrumentation.☆25Feb 19, 2026Updated last month
- ☆13Dec 14, 2021Updated 4 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- ☆20Dec 4, 2023Updated 2 years ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆62May 16, 2025Updated 10 months ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- ☆81Sep 7, 2023Updated 2 years ago
- ☆13Nov 14, 2023Updated 2 years ago
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 3 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- A port of the RIPE suite to RISC-V.☆29Oct 10, 2018Updated 7 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- ☆15May 26, 2021Updated 4 years ago
- Runtime type and bounds-error checking for C/C++☆108Dec 18, 2024Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- A LLVM Pass with runtime dataflow sanitization☆32Mar 28, 2019Updated 6 years ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆33Jun 16, 2024Updated last year
- Using simple seccomp filters☆26Aug 5, 2012Updated 13 years ago
- ☆13Jun 26, 2020Updated 5 years ago