airbus-seclab / gustave
GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuzz OS kernels like simple applications.
☆198Updated 3 years ago
Alternatives and similar repositories for gustave:
Users that are interested in gustave are comparing it to the libraries listed below
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulati…☆288Updated 2 years ago
- AFL binary instrumentation☆296Updated 2 months ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆299Updated 2 years ago
- ☆249Updated 5 years ago
- Bug hunting through fuzzer/*-sanitizer/etc...☆132Updated 4 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆150Updated 6 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆342Updated 4 months ago
- A Kernel fuzzer focusing on race bugs☆362Updated 5 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆206Updated 3 years ago
- a friendly wrapper around ptrace☆132Updated 3 years ago
- ☆160Updated 3 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆472Updated 8 months ago
- A fuzzing introspection tool☆165Updated 4 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆137Updated 3 years ago
- Self-hosting binary instrumentation framework for security research☆212Updated last year
- A vulnerable C program for testing fuzzers.☆196Updated 2 years ago
- Kernel Test Framework☆141Updated 2 months ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆146Updated last year
- Linux kernel exploitation experiments☆199Updated 2 weeks ago
- ☆63Updated 5 years ago
- ☆131Updated 5 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆193Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆254Updated last week
- AFL/QEMU fuzzing with full-system emulation.☆629Updated 6 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆151Updated last year
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 3 years ago
- ☆186Updated last year
- A de-socketing library for fuzzing.☆142Updated 3 weeks ago