trailofbits / clang-cfi-showcaseLinks
Sample programs that illustrate how to use control flow integrity with the clang compiler
☆106Updated 6 years ago
Alternatives and similar repositories for clang-cfi-showcase
Users that are interested in clang-cfi-showcase are comparing it to the libraries listed below
Sorting:
- ☆65Updated 4 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Updated 3 years ago
- Fast static binary instrumentation for linux/x86☆83Updated 8 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Updated last month
- ☆55Updated 2 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- A patched version of VEX to work with PyVEX.☆110Updated 5 months ago
- MCFI/PICFI tool chain☆43Updated last year
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- Clang instrumentation module for tracing variable and buffer comparisons in C/C++ and saving the coverage data to .sancov files☆201Updated 6 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆260Updated 2 months ago
- ☆37Updated 3 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- ☆63Updated 6 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆62Updated 2 years ago
- ☆55Updated 5 years ago
- Utilities for generating dynamic traces☆92Updated 4 months ago
- ☆72Updated 5 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆136Updated 6 years ago
- fuzzing framework based on libfuzzer and clang sanitizer☆167Updated 6 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆148Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- ☆96Updated 6 years ago
- Timeless debugging with symbolic execution and processor trace☆76Updated 4 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 8 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago