season-lab / sok-dbi-securityView external linksLinks
Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)"
☆24Nov 12, 2019Updated 6 years ago
Alternatives and similar repositories for sok-dbi-security
Users that are interested in sok-dbi-security are comparing it to the libraries listed below
Sorting:
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- The toolchain of Chosen-instruction attack☆21May 3, 2022Updated 3 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 8 months ago
- ☆13Apr 27, 2020Updated 5 years ago
- ☆12Mar 25, 2020Updated 5 years ago
- ☆12Jul 9, 2025Updated 7 months ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Dec 22, 2021Updated 4 years ago
- ☆16Aug 4, 2023Updated 2 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆18Aug 12, 2016Updated 9 years ago
- Code and Data for AisaCCS 2018 paper: Hardware Performance Counters Can Detect Malware: Myth or Fact?☆22Updated this week
- ☆20Jun 13, 2022Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- ☆25Jun 2, 2024Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- SUPA☆28Jan 15, 2026Updated last month
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 5 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Windows Hypervisor Platform client☆31Jun 13, 2018Updated 7 years ago
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- ☆34Apr 14, 2025Updated 10 months ago
- ☆23Jun 14, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "Efficient and Generic Microarchitectural Hash-Function Recovery" (IEEE S&P 2024)☆33Aug 30, 2023Updated 2 years ago
- ☆31Feb 20, 2022Updated 3 years ago
- Debug Print viewer (user and kernel)☆71Feb 7, 2024Updated 2 years ago
- A port of the RIPE suite to RISC-V.☆29Oct 10, 2018Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆34Mar 27, 2018Updated 7 years ago
- ☆26Oct 5, 2016Updated 9 years ago
- 1day practice - Escape macOS sandbox (partial) using RemoteViewServices☆42May 12, 2025Updated 9 months ago