vpappas / kbouncerView external linksLinks
Runtime Runtime-Oriented Programming (ROP) protection
☆11Feb 17, 2019Updated 6 years ago
Alternatives and similar repositories for kbouncer
Users that are interested in kbouncer are comparing it to the libraries listed below
Sorting:
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- Match GPS traces against OpenStreetMap data to find where you haven't gone yet☆13Apr 12, 2021Updated 4 years ago
- ☆16Aug 4, 2023Updated 2 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Jul 19, 2021Updated 4 years ago
- a plugin to calculate complexity of executable's functions☆18May 17, 2022Updated 3 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆51Jul 11, 2020Updated 5 years ago
- ☆25Dec 8, 2020Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- tool for multi-execution jump coverage introspection☆68Jan 28, 2025Updated last year
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Sep 9, 2020Updated 5 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82May 3, 2015Updated 10 years ago
- A framework for static analysis of ROP exploits and programs☆40May 13, 2019Updated 6 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated last month
- Tokio-based streaming API for UDP + DTLS sessions☆11Apr 11, 2024Updated last year
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Nov 20, 2015Updated 10 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 2 months ago
- Hyperledger fabric demo using the balance transfer code as a base☆13Aug 3, 2018Updated 7 years ago
- A Snowflake SQL parser (WIP)☆11May 31, 2020Updated 5 years ago
- Python3 version of UC Berkeley's CS 188 Pacman Capture the Flag project☆10Mar 14, 2024Updated last year
- ☆12Feb 8, 2021Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 7 months ago
- ☆12Jul 27, 2017Updated 8 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆11Apr 14, 2017Updated 8 years ago
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆17Dec 18, 2025Updated last month
- ☆12Sep 6, 2020Updated 5 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago