GJDuck / e9syscall
A system call interception tool
☆57Updated 5 months ago
Alternatives and similar repositories for e9syscall:
Users that are interested in e9syscall are comparing it to the libraries listed below
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- ☆83Updated last month
- ☆36Updated last year
- ☆37Updated 2 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆49Updated 9 months ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Explore a live Linux kernel's memory using GDB☆115Updated 2 years ago
- ☆88Updated 7 months ago
- Binary exploitation by confusing the unwinder☆61Updated 2 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆68Updated 7 months ago
- ☆42Updated 3 years ago
- A binary hardening system☆107Updated last year
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 4 months ago
- ☆20Updated 7 months ago
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆41Updated 2 years ago
- tool for multi-execution jump coverage introspection☆64Updated 3 months ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- Generation-based, context-free grammar fuzzer.☆52Updated 2 years ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆22Updated last year
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- First level taint implementation with qemu for linux user mode☆28Updated 4 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆64Updated 3 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- exec interceptor☆27Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- Custom Agent and Tooling for using Nyx with Firefox☆18Updated 9 months ago
- An example fuzzer about how to fuzz a JS engine combinign Nautilus with Token-level fuzzing☆43Updated last year