Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)"
☆24Nov 12, 2019Updated 6 years ago
Alternatives and similar repositories for sok-dbi-security
Users that are interested in sok-dbi-security are comparing it to the libraries listed below
Sorting:
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- ☆13Apr 27, 2020Updated 5 years ago
- ☆12Mar 25, 2020Updated 5 years ago
- ☆12Jul 9, 2025Updated 8 months ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- ☆16Aug 4, 2023Updated 2 years ago
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆18Aug 12, 2016Updated 9 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- ☆25Jun 2, 2024Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- SUPA☆28Jan 15, 2026Updated last month
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- Windows Hypervisor Platform client☆31Jun 13, 2018Updated 7 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- ☆23Jun 14, 2023Updated 2 years ago
- ☆34Apr 14, 2025Updated 10 months ago
- Debug Print viewer (user and kernel)☆72Feb 7, 2024Updated 2 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- A port of the RIPE suite to RISC-V.☆29Oct 10, 2018Updated 7 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- Juliet C/C++ Dynamic Test Suite☆35Apr 18, 2023Updated 2 years ago
- ☆26Oct 5, 2016Updated 9 years ago
- 1day practice - Escape macOS sandbox (partial) using RemoteViewServices☆44May 12, 2025Updated 9 months ago
- Extensions for LLVM's JIT to run Objective-C and Swift code.☆38Sep 29, 2019Updated 6 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago