HackOvert / awesome-bugsLinks
A collection of software bug types and articles showcasing the hunt for and exploitation of them.
☆20Updated 4 years ago
Alternatives and similar repositories for awesome-bugs
Users that are interested in awesome-bugs are comparing it to the libraries listed below
Sorting:
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 2 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 4 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆39Updated 3 years ago
- Python interface for Binexport, the Bindiff export format☆15Updated last month
- ☆57Updated 2 months ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Updated 3 years ago
- lxfuzz is a grey-box kernel fuzzer used for linux. it is scalable because of qemu being used to emulate in a way to be able to freely cho…☆22Updated last year
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last year
- linux-exploit☆14Updated 6 years ago
- Collections of patterns for weggli to find nice bugs☆20Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18Updated 2 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- ☆19Updated 3 years ago
- Investigating the bug behind CVE-2021-26708☆28Updated 4 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- Superion Mutator for AFLPlusPlus☆31Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- ☆31Updated 5 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆51Updated 4 months ago
- Tutorial to write qemu plugins☆34Updated 8 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year