PSU-Security-Universe / countdownView external linksLinks
A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel
☆30Jun 24, 2025Updated 7 months ago
Alternatives and similar repositories for countdown
Users that are interested in countdown are comparing it to the libraries listed below
Sorting:
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 8 months ago
- MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency☆19Dec 21, 2024Updated last year
- A tool for automatically identifying syscall-guard variables☆36May 15, 2025Updated 8 months ago
- A list of data-only attacks☆21Aug 22, 2025Updated 5 months ago
- Bug detection framework for finding Finger tracable bugs in Linux☆20Mar 23, 2025Updated 10 months ago
- ☆29Aug 7, 2025Updated 6 months ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- Code of Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices (NDSS 2025)☆22Apr 11, 2025Updated 10 months ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- ☆16Apr 6, 2023Updated 2 years ago
- ☆19Dec 4, 2023Updated 2 years ago
- ☆27Nov 30, 2024Updated last year
- Mining Error-Handling Bugs without Error Specification Input☆15Jan 13, 2020Updated 6 years ago
- A collection of online resources that I found useful for Ph.D. students☆17Apr 14, 2022Updated 3 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Nov 10, 2025Updated 3 months ago
- ☆21Apr 15, 2022Updated 3 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Nov 13, 2025Updated 3 months ago
- ☆24Nov 16, 2023Updated 2 years ago
- Slides about HyperDbg☆40Updated this week
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆83Jan 20, 2025Updated last year
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 9 years ago
- Formally verified x86-64 decompilation☆44Feb 2, 2026Updated last week
- ☆33Jun 5, 2023Updated 2 years ago
- ☆38Feb 15, 2022Updated 3 years ago
- ☆37Jun 23, 2025Updated 7 months ago
- ☆10Sep 28, 2020Updated 5 years ago
- VulTrigger is a tool to for identifying vulnerability-triggering statements across functions and investigating the effectiveness of funct…☆43Dec 29, 2023Updated 2 years ago
- Everything you need to build and run Linux and Android kernels for exploit development☆100Apr 9, 2024Updated last year
- PORTGPT: Towards Automated Backporting Using Large Language Models(IEEE S&P2026)☆30Feb 6, 2026Updated last week
- VMSDK implements the Evidence API☆11Nov 25, 2024Updated last year
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- ☆12Feb 2, 2024Updated 2 years ago
- Public repository of the UCSC CMPE220 class project☆10Oct 8, 2017Updated 8 years ago
- A simple 8086-CPU simulator using Verilog and Quartus II☆10Jul 9, 2018Updated 7 years ago
- MCFI/PICFI tool chain☆45Mar 21, 2024Updated last year
- Linux integrity monitoring for CentOS/RHEL☆10May 13, 2020Updated 5 years ago
- A memory allocator that aims to eliminate dangling pointer vulnerabilities at a low overhead, using virtualisation via Dune. My Computer …☆10Nov 27, 2019Updated 6 years ago