☆18Jul 17, 2015Updated 10 years ago
Alternatives and similar repositories for v8-sandbox
Users that are interested in v8-sandbox are comparing it to the libraries listed below
Sorting:
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- Simple Simulator of ARMv6m instructions☆17May 23, 2017Updated 8 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- Linux call graph visualization☆28Jul 16, 2018Updated 7 years ago
- 3DS WebKit haxx☆32Jul 27, 2016Updated 9 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆30Jun 24, 2015Updated 10 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- C standard library and communication layer for the Supercard DSTwo☆14Sep 29, 2017Updated 8 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Tilhr Technology® Open-source Folder☆11Apr 29, 2022Updated 3 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- A remote shell, TCP tunnel and HTTP proxy for Replit.☆12Apr 20, 2022Updated 3 years ago
- Julia ❤️ Excel☆11Jun 1, 2021Updated 4 years ago
- AES Key Bruteforcer, used to disclose proper keys for Arm9LoaderHax exploit☆11May 19, 2016Updated 9 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- A cute little Bash library for blazing fast argument parsing☆11Feb 6, 2026Updated 3 weeks ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- ☆12Aug 13, 2014Updated 11 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- Presentations, Videos, and Sample Source from Austin LLVM Meetups☆11Jul 23, 2020Updated 5 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- Convert English contractions to complete words.☆10May 3, 2016Updated 9 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- Voxel engine made with OpenGL and C☆13Mar 21, 2025Updated 11 months ago
- Core business logic of SolidOS☆12Updated this week
- NikSne's NixOS dotfiles☆10Feb 24, 2026Updated last week
- Ricerca research kernel project to learn more about SMP, load balancing and NUMA☆10Dec 7, 2021Updated 4 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago
- A consolidation of all the Centuries I have started☆10Jun 6, 2020Updated 5 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- 3DS app to debug 3DS applications via a network connection.☆12Jun 21, 2016Updated 9 years ago
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago