KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | ๐ Best Practical Paper Award of RAID 2024
โ83Oct 15, 2025Updated 5 months ago
Alternatives and similar repositories for KernJC
Users that are interested in KernJC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22โ14Jul 14, 2022Updated 3 years ago
- โ27Nov 30, 2024Updated last year
- โ16Aug 19, 2024Updated last year
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectioโฆโ25Sep 5, 2021Updated 4 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTFโ77Aug 8, 2022Updated 3 years ago
- CVE-2022-0185 exploit rewritten with pipe primitiveโ17Apr 5, 2022Updated 3 years ago
- โ23Jul 18, 2023Updated 2 years ago
- โ13Apr 13, 2023Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you tโฆโ39Nov 26, 2024Updated last year
- ไบๅ็ๅฎๅ จๆผๆดๆถ้โ18Jul 9, 2025Updated 8 months ago
- IEEE S&P 2023 - DEVFUZZ: Automatic Device Model-Guided Device Driver Fuzzingโ14Dec 16, 2024Updated last year
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernelโ33Apr 6, 2022Updated 3 years ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcacheโ42Jun 28, 2024Updated last year
- Industrial Cybersecurity Conference Indexโ13Mar 11, 2024Updated 2 years ago
- Research developed by Allele Security Intelligence.โ17Jul 21, 2025Updated 8 months ago
- A collection of various exploitsโ29Sep 17, 2024Updated last year
- โ50Mar 12, 2026Updated last week
- Investigating the bug behind CVE-2021-26708โ28Feb 16, 2021Updated 5 years ago
- An standalone execution trace library built on DynamoRIO.โ23Jul 4, 2022Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defensesโ13Sep 19, 2023Updated 2 years ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)โ62May 16, 2025Updated 10 months ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilitiesโ91May 7, 2024Updated last year
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.โ28Nov 23, 2022Updated 3 years ago
- Official repository of SyzRisk [ASIA CCS'24]โ12Aug 20, 2024Updated last year
- OCaml hacking ideas, small and large.โ20Apr 9, 2024Updated last year
- PalanTรญr: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22โ24Nov 11, 2024Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22โ28Apr 17, 2023Updated 2 years ago
- CVE-2024-37051 poc and exploitโ29Jun 11, 2024Updated last year
- โ10Mar 3, 2024Updated 2 years ago
- Read only mirror - No pull requestsโ20May 7, 2021Updated 4 years ago
- An exploit primitive in linux kernel inspired by DirtyPipeโ101Apr 5, 2022Updated 3 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.โ85Jan 20, 2025Updated last year
- A fuzzing framework for Hexagon baseband firmware using QEMU system emulation.โ130Oct 9, 2025Updated 5 months ago
- โ86Sep 19, 2024Updated last year
- The companion repository for the 39C3 talk: Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMUโ38Feb 4, 2026Updated last month
- The published code repo for the Cortex-M SoK paper.โ28Feb 5, 2026Updated last month
- For V8CTF M122โ14Aug 25, 2024Updated last year
- โ22Dec 1, 2025Updated 3 months ago
- โ30May 16, 2022Updated 3 years ago