Earl31 / IntlStudy_bbfuzzLinks
Black Box Fuzzing(Bluetooth)
☆10Updated 9 years ago
Alternatives and similar repositories for IntlStudy_bbfuzz
Users that are interested in IntlStudy_bbfuzz are comparing it to the libraries listed below
Sorting:
- PoC code for CVE-2017-13253☆37Updated 5 years ago
- Android Vulnerability Reports and POCs.☆27Updated 9 years ago
- Exploit code for CVE-2018-9411 for MediaCasService☆52Updated 7 years ago
- Some Proof-of-Concepts of bugs I found☆44Updated 6 years ago
- baseband security research☆84Updated 4 years ago
- Symbolic Execution of Android Framework☆15Updated 8 years ago
- ☆16Updated 6 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 6 years ago
- ☆74Updated 8 years ago
- ☆31Updated 9 years ago
- ☆92Updated 3 years ago
- ☆41Updated 9 years ago
- ☆13Updated 6 years ago
- Magellan PoC☆34Updated 7 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Updated 9 years ago
- In memory fuzzing for embedded devices☆19Updated 13 years ago
- An Android port of radamsa fuzzer☆68Updated 6 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Updated 9 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- ☆16Updated 8 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Updated 7 years ago
- Some tee/trustzone helper stuff☆56Updated 6 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- ☆38Updated 9 years ago
- ☆14Updated 7 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago