The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Time Return-Oriented Programming (JIT-ROP). We utilize the JIT-ROP technique to evaluate different fine-grained address space layout randomization (ASLR) schemes and measure the upper bound of effective re-random…
☆20Apr 30, 2022Updated 3 years ago
Alternatives and similar repositories for jitrop-native
Users that are interested in jitrop-native are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of a thin hypervisor☆43May 20, 2016Updated 9 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Standalone Metasploit-like XOR encoder for shellcode☆51May 12, 2024Updated last year
- Systems and Software Security☆16Nov 13, 2025Updated 4 months ago
- ☆29Jul 4, 2018Updated 7 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- a tool for CoreDump☆14Oct 21, 2017Updated 8 years ago
- Self-hosting binary instrumentation framework for security research☆225Aug 1, 2023Updated 2 years ago
- Lock-free RCU (Read-Copy-Update) user-space library☆12Jan 3, 2026Updated 2 months ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- 通过内存特征检测frida☆10Nov 5, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- ☆13Apr 13, 2023Updated 2 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- Scripts or utilities for radare2☆15Sep 10, 2016Updated 9 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- My ctf-writeups☆12Jan 28, 2019Updated 7 years ago
- Hiding the window from screenshots using the function win32kfull::ChangeWindowTreeProtection☆11Jan 3, 2022Updated 4 years ago
- IEEE1588v2 Precision Time Protocol implementation☆13Jun 21, 2021Updated 4 years ago
- obfuscation that aims to not stand out☆24Mar 27, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- 一款适用于iOS的隐私合规检测工具☆17Feb 25, 2024Updated 2 years ago
- Deduplication over dis-aggregated memory for Serverless Computing☆14Mar 21, 2022Updated 4 years ago
- Frida uses libunwind for generating backtraces on some platforms☆17Jun 22, 2024Updated last year
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- ☆15Feb 5, 2022Updated 4 years ago
- An analyzer of JNI code that matches native code information with Java code☆23Nov 12, 2021Updated 4 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- Uart module written in chisel☆13Feb 19, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- IFL - Interactive Functions List (plugin for Binary Ninja)☆25Jul 9, 2024Updated last year
- ☆13Oct 14, 2016Updated 9 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- MASCAB: a Micro-Architectural Side-Channel Attack Bibliography☆42Sep 7, 2018Updated 7 years ago
- ☆13May 22, 2023Updated 2 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago