Root Repo for the RLBox Sandboxing Library Research prototype. Note: this is the original research prototype for this library. For the production version of rlbox, go to rlbox.dev
☆24Sep 14, 2023Updated 2 years ago
Alternatives and similar repositories for LibrarySandboxing
Users that are interested in LibrarySandboxing are comparing it to the libraries listed below
Sorting:
- ☆20Mar 10, 2022Updated 3 years ago
- ☆45Apr 8, 2020Updated 5 years ago
- ☆12Apr 23, 2021Updated 4 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- ☆14Jun 11, 2020Updated 5 years ago
- ☆13Oct 8, 2021Updated 4 years ago
- Slow llvm tracing for the masses☆14Feb 22, 2020Updated 6 years ago
- Security-Oriented Analysis of Application Programs☆13Dec 14, 2018Updated 7 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- A simple demo to autorun beef modules.☆16Aug 19, 2023Updated 2 years ago
- A Windows disk dumper☆23Nov 12, 2015Updated 10 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 6 months ago
- Scone Website☆11Oct 24, 2025Updated 4 months ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- A Python Package for the Google Chrome Dev Protocol [asyncio base]☆23Mar 31, 2023Updated 2 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- ☆30Jan 7, 2021Updated 5 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 2 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- Collection of AI and Security Papers☆27Apr 17, 2020Updated 5 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆74Dec 5, 2019Updated 6 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Feb 13, 2022Updated 4 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- A Webkit RCE exploit and an SBX bug☆34Jun 8, 2019Updated 6 years ago
- Malware sandbox evasion tricks and solution☆32Jul 5, 2017Updated 8 years ago
- Bringing Mandatory Access Control to Android apps☆11Dec 20, 2021Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆38Aug 30, 2022Updated 3 years ago
- Materials from the DEF CON 30 talk on PACMAN☆34Oct 28, 2022Updated 3 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Jul 29, 2018Updated 7 years ago
- Signedness-Agnostic Strided-Interval☆38Jun 21, 2019Updated 6 years ago