OS3Lab / qemu-kreitLinks
Modified qemu for binary-only kernel tracing, address sanitizer and so on
☆19Updated 6 months ago
Alternatives and similar repositories for qemu-kreit
Users that are interested in qemu-kreit are comparing it to the libraries listed below
Sorting:
- ASCII-generator in Go☆18Updated 10 months ago
- Catch IPv6 NS on WAN and send it to LAN. (Should) Make OpenWrt IPv6 ndp relay work.☆15Updated 7 months ago
- Filter out critical open source software with our metrics☆37Updated last month
- ☆12Updated 10 months ago
- Deploy and customize our own pwn.college - pwn.hust.college☆57Updated 4 months ago
- ☆94Updated 10 months ago
- ☆27Updated last year
- ☆25Updated 3 years ago
- ☆69Updated 2 years ago
- ☆37Updated 7 months ago
- ☆20Updated 5 months ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Updated 2 years ago
- ☆39Updated last year
- a GDB plug-in for inspecting mallocng☆60Updated last year
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50Updated 8 months ago
- ☆56Updated 3 years ago
- ☆12Updated 2 years ago
- ☆43Updated 4 years ago
- Automatic use of House of Some & House of Illusion.☆84Updated 4 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆82Updated last year
- DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing☆11Updated 2 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Updated last year
- Bug detection framework for finding Finger tracable bugs in Linux☆20Updated 10 months ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆29Updated 7 months ago
- ☆31Updated 2 years ago
- ☆124Updated last year
- Templates for deploying pwn challenge in ctf☆51Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆337Updated last year
- A tool to initialize pwn game exploit enviroment.☆43Updated 2 months ago
- ☆238Updated 2 years ago