☆26Oct 13, 2015Updated 10 years ago
Alternatives and similar repositories for caver
Users that are interested in caver are comparing it to the libraries listed below
Sorting:
- Inter-procedural analysis framework and dependency/information-flow analysis for LLVM☆19Mar 2, 2013Updated 13 years ago
- IntFlow is an LLVM-based arithmetic error detection tool that combines static information flow tracking and dynamic program analysis☆16Apr 4, 2015Updated 10 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- ☆17Apr 18, 2019Updated 6 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Nov 5, 2021Updated 4 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆103Apr 20, 2024Updated last year
- ☆10Sep 29, 2019Updated 6 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- Staging area for work on Integer Overflow Checker (IOC), a clang extension that provides compiler flags to insert check for various sourc…☆22Oct 31, 2012Updated 13 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- ☆15Dec 26, 2017Updated 8 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated 2 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- ☆30May 23, 2017Updated 8 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- A Parallelism Profiler with What-If analyses for Intel Threading Building Blocks (TBB) programs☆14Feb 13, 2018Updated 8 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 8 years ago
- Likes WinIO library( http://www.internals.com/utilities_main.htm ),but WinIO library only support PS/2 keyboard, if you use USB keyboard,…☆15Feb 2, 2017Updated 9 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Experimental setup of "Intel MPX explained"☆29Feb 4, 2020Updated 6 years ago
- ☆40Jan 10, 2012Updated 14 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- RLIBM-ALL: A correctly rounded math library and a polynomial generator that produces correct results for multiple floating point represen…☆16Oct 6, 2023Updated 2 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- ☆12Nov 2, 2015Updated 10 years ago
- Basic Block Trace: DynamoRIO client☆29Dec 19, 2021Updated 4 years ago
- This is a C++ implementation of Graspan.☆32Dec 20, 2023Updated 2 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago