HexHive / HyperPillLinks
☆58Updated last month
Alternatives and similar repositories for HyperPill
Users that are interested in HyperPill are comparing it to the libraries listed below
Sorting:
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 10 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆205Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆90Updated 3 years ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆32Updated last year
- ViDeZZo source code.☆39Updated 6 months ago
- Linux Kernel Fuzzer Corpus☆150Updated this week
- A data-flow-guided fuzzer☆123Updated 2 years ago
- ☆80Updated 2 years ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆45Updated 2 years ago
- ☆38Updated last year
- ☆29Updated 2 years ago
- ☆26Updated last year
- ☆15Updated 2 years ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated 2 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆82Updated 9 months ago
- ☆31Updated last year
- NDSS 2020 - HYPER-CUBE: High-Dimensional Hypervisor Fuzzing☆64Updated 2 years ago
- ☆55Updated last year
- ☆94Updated last year
- Produce code coverage results with gcov from afl-fuzz test cases☆87Updated 9 months ago
- ☆17Updated last year
- Material and examples for a presentation on static binary analysis.☆45Updated 4 years ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- ☆42Updated 2 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆64Updated last year
- Symbolic Execution Over Processor Traces☆123Updated last year
- Source code release for the KRace project☆29Updated 3 years ago
- ☆23Updated 6 months ago
- ☆29Updated 3 years ago