☆23Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for patharmor
Users that are interested in patharmor are comparing it to the libraries listed below
Sorting:
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- The Linux Scheduler Simulator☆12Dec 20, 2010Updated 15 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- Systems and Software Security☆16Nov 13, 2025Updated 4 months ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- ☆32Jan 3, 2022Updated 4 years ago
- Fast Binary Translator for the Kernel☆28Sep 23, 2013Updated 12 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- CVE-2013-2028 python exploit☆20Jun 27, 2020Updated 5 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 10 months ago
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 3 years ago
- ☆11Jul 26, 2022Updated 3 years ago
- ☆35Feb 4, 2026Updated last month
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆29Aug 7, 2025Updated 7 months ago
- A list of data-only attacks☆21Aug 22, 2025Updated 6 months ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Security Test Benchmark for Computer Architectures☆20Sep 24, 2025Updated 5 months ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- ☆20Nov 6, 2024Updated last year
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- Partitioned Unit Memory Management☆16Nov 28, 2022Updated 3 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- ☆74Dec 5, 2019Updated 6 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 6 years ago
- ☆55Mar 30, 2020Updated 5 years ago