FlorentRevest / syz-rrrLinks
Deterministic record and replay and tracing of syzkaller bug reproducers
☆20Updated 2 months ago
Alternatives and similar repositories for syz-rrr
Users that are interested in syz-rrr are comparing it to the libraries listed below
Sorting:
- Automate generation of syzkaller's grammar☆16Updated 2 years ago
- A tool to perform so called BGE attack☆24Updated last month
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- ☆14Updated 8 months ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Updated last year
- ☆18Updated 3 years ago
- TrustZone Trusted Application 0-Days by Design☆22Updated 2 months ago
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆126Updated 7 months ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- Custom Agent and Tooling for using Nyx with Firefox☆18Updated 2 weeks ago
- An IOKit kext designed for microarchitectural security research on M1☆43Updated 2 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- ☆15Updated 2 years ago
- ☆42Updated 3 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆60Updated last year
- WTF Snapshot fuzzing of macOS targets☆96Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆36Updated 4 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- ☆47Updated 3 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- ☆38Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆45Updated 5 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- LKRG bypass methods☆72Updated 5 years ago
- ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation☆21Updated 4 months ago
- ROSA: Finding Backdoors with Fuzzing☆23Updated 2 weeks ago