Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks
☆48Apr 6, 2017Updated 8 years ago
Alternatives and similar repositories for typearmor
Users that are interested in typearmor are comparing it to the libraries listed below
Sorting:
- ☆12Jun 14, 2021Updated 4 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- A static binary rewriter that does not use heuristics☆310May 17, 2018Updated 7 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Oct 4, 2022Updated 3 years ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- ☆15May 26, 2021Updated 4 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- VTable Hijacking Protection for Binaries☆12Feb 28, 2017Updated 9 years ago
- ☆58Sep 27, 2021Updated 4 years ago
- ☆60Dec 5, 2024Updated last year
- The central ASPIRE framework repository, start here if you want to use our tools (this contains all tools and documentation)☆13Apr 17, 2021Updated 4 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Sep 16, 2022Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- ☆38Feb 15, 2022Updated 4 years ago
- ☆29Aug 7, 2025Updated 7 months ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆29Nov 14, 2018Updated 7 years ago
- ☆17Apr 18, 2019Updated 6 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- DyninstAPI: Tools for binary instrumentation, analysis, and modification.☆819Updated this week
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A collection of command-line tools based on Dyninst☆18Jun 3, 2021Updated 4 years ago
- ☆35Feb 4, 2026Updated last month
- Top-level repository for LFI: Practical, Efficient, and Secure Software-based Sandboxing☆107Jan 27, 2026Updated last month
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆46Jun 5, 2025Updated 9 months ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- Fast and efficient binary translator☆58Jan 17, 2019Updated 7 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- TFA project for indirect call analysis☆10Mar 13, 2025Updated last year
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- ☆145Oct 26, 2024Updated last year