☆67May 5, 2021Updated 4 years ago
Alternatives and similar repositories for dangsan
Users that are interested in dangsan are comparing it to the libraries listed below
Sorting:
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- Prototype allocator for the prevention of use-after-free attacks, as described in the S&P 2020 Paper - "MarkUs: Drop-in use-after-free pr…☆14Jan 14, 2022Updated 4 years ago
- Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv☆40Nov 23, 2019Updated 6 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Sep 5, 2017Updated 8 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- ☆11Mar 29, 2019Updated 6 years ago
- ☆15May 6, 2021Updated 4 years ago
- ☆10May 12, 2023Updated 2 years ago
- Fuzzing with controlled compilation☆31Apr 7, 2023Updated 2 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56May 24, 2022Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- A toy implementation of 'Stack Guard' on top of the LLVM compiler toolchain☆24Jul 1, 2017Updated 8 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆125Mar 31, 2021Updated 4 years ago
- Modular And Compositional analysis with KLEE Engine☆117Dec 17, 2019Updated 6 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Feb 22, 2019Updated 7 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- ☆53Nov 26, 2017Updated 8 years ago
- ☆52Jun 15, 2022Updated 3 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Feb 6, 2021Updated 5 years ago
- ☆125Mar 15, 2021Updated 4 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- print information from LLVM dataflow analyses☆13Jan 22, 2020Updated 6 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- ☆39Mar 31, 2021Updated 4 years ago