OS3Lab / qemu-kreitLinks
Modified qemu for binary-only kernel tracing, address sanitizer and so on
☆19Updated 3 months ago
Alternatives and similar repositories for qemu-kreit
Users that are interested in qemu-kreit are comparing it to the libraries listed below
Sorting:
- ASCII-generator in Go☆19Updated 7 months ago
- Catch IPv6 NS on WAN and send it to LAN. (Should) Make OpenWrt IPv6 ndp relay works.☆14Updated 4 months ago
- Filter out critical open source software with our metrics☆37Updated last week
- Deploy and customize our own pwn.college - pwn.hust.college☆56Updated last month
- ☆12Updated 7 months ago
- ☆36Updated 4 months ago
- ☆92Updated 7 months ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Updated 2 years ago
- ☆24Updated 3 years ago
- ☆65Updated 2 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆47Updated 5 months ago
- ☆38Updated last year
- The code and dataset of the paper.☆14Updated 7 months ago
- ☆24Updated 10 months ago
- [USENIX Security 25] PatchAgent is a LLM-based practical program repair agent that mimics human expertise.☆97Updated last week
- ☆29Updated 2 years ago
- ☆12Updated last year
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆14Updated last year
- a GDB plug-in for inspecting mallocng☆58Updated last year
- ☆19Updated 2 months ago
- ☆30Updated 2 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Updated last year
- ☆16Updated 2 months ago
- Bug detection framework for finding Finger tracable bugs in Linux☆21Updated 7 months ago
- This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)☆30Updated last year
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆24Updated 4 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆76Updated 10 months ago
- ☆28Updated 3 years ago
- DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing☆11Updated 2 years ago
- Curated list of classic fuzzing books, papers about fuzzing at information security top conferences over the years, commonly used fuzzing…☆378Updated 2 weeks ago