SmoothHacker / Tuscan-Leather
Linux Kernel Snapshot Fuzzer using KVM
☆46Updated last year
Alternatives and similar repositories for Tuscan-Leather:
Users that are interested in Tuscan-Leather are comparing it to the libraries listed below
- harness for fuzzing with winafl. both public and my own which i have released.☆56Updated 4 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- ☆34Updated 3 years ago
- Various debugging tools such as %DumpObjects for v8☆53Updated 6 years ago
- ☆28Updated last year
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 2 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- haze binary fuzzer☆52Updated 10 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- ☆36Updated 6 years ago
- ☆31Updated 4 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 2 months ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆78Updated 7 months ago
- ☆153Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Target components for kAFL/Nyx Fuzzer☆33Updated last year
- My Material for the HITB presentation☆35Updated 4 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆74Updated 4 years ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆161Updated 3 years ago
- ☆37Updated 11 months ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- Target components for kAFL/Nyx Fuzzer☆27Updated last week
- ☆67Updated last year
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated 2 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago