zhexwang / CR2Links
RERANZ: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks (See Paper VEE'2017)
☆10Updated 7 years ago
Alternatives and similar repositories for CR2
Users that are interested in CR2 are comparing it to the libraries listed below
Sorting:
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Updated 7 years ago
- S2E plugins library☆17Updated 5 years ago
- FlowWalker is a practical off-line taint analysis framework with high efficiency and low overhead.☆10Updated 10 years ago
- Crappy Win32k syscall fuzzer☆13Updated 10 years ago
- Microsoft Edge MemGC Internals☆17Updated 9 years ago
- ☆15Updated 9 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 10 years ago
- Random Codes Related to Reverse Engineering☆10Updated 2 years ago
- taint tracer/analysis pintool☆25Updated 10 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆15Updated 10 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- PoC || GTFO Article Materials on Kernel Double Free☆12Updated 8 years ago
- Материалы к статье "Препарируем Hyper V"☆13Updated 10 years ago
- ☆19Updated 5 years ago
- PinVMShield: Dynamic Binary Instrumentation evasion/detection☆11Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- ☆12Updated 8 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- liberty writeup defcon 2017☆10Updated 8 years ago
- Immunity Debugger Taint Tracer☆20Updated 11 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Updated 8 years ago
- Dynamic Control Flow Recovery☆24Updated 7 years ago
- Linux rootkit experimentations☆19Updated 10 years ago
- Basic Block Trace: DynamoRIO client☆27Updated 3 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago