Keysight / optee_fuzzerLinks
This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.
☆141Updated 4 years ago
Alternatives and similar repositories for optee_fuzzer
Users that are interested in optee_fuzzer are comparing it to the libraries listed below
Sorting:
- ☆66Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- My fork of American Fuzzy Lop☆61Updated 7 years ago
- K-Miner☆74Updated 6 years ago
- ☆107Updated 6 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆83Updated 10 months ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Updated 6 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆30Updated 4 years ago
- ☆74Updated 6 years ago
- ☆66Updated 5 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 6 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆143Updated 2 years ago
- We hinder fuzzing☆68Updated 3 years ago
- ☆46Updated 4 years ago
- ☆56Updated last year
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆96Updated 2 years ago
- BigMAC: Analysis tool to introspect and query Android security policies.☆40Updated 2 years ago
- source code for savior fuzzer☆127Updated 5 years ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- ☆47Updated 3 years ago
- UAF Fuzzing Benchmark☆57Updated 4 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated last year
- ☆53Updated 5 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Updated 4 years ago
- ☆67Updated 5 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Updated 2 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- ☆32Updated 5 years ago