airbus-seclab / gustaveLinks
GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuzz OS kernels like simple applications.
☆202Updated 4 years ago
Alternatives and similar repositories for gustave
Users that are interested in gustave are comparing it to the libraries listed below
Sorting:
- A fuzzing introspection tool☆167Updated 5 years ago
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulati…☆290Updated 3 years ago
- Self-hosting binary instrumentation framework for security research☆217Updated 2 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 5 years ago
- ☆163Updated 4 years ago
- A vulnerable C program for testing fuzzers.☆203Updated 3 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆222Updated 5 months ago
- A de-socketing library for fuzzing.☆161Updated 4 months ago
- ☆188Updated 8 months ago
- A distributed fuzzing management framework☆68Updated 5 years ago
- Boring tool to launch multiple afl-fuzz instances☆52Updated 8 years ago
- ☆132Updated 6 years ago
- AFL binary instrumentation☆301Updated 10 months ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆473Updated last year
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆197Updated 3 years ago
- a friendly wrapper around ptrace☆134Updated 3 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆304Updated 2 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆76Updated 3 years ago
- Kernel Test Framework☆149Updated 2 weeks ago
- A Dolev-Yao-model-guided fuzzer for TLS☆149Updated this week
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Updated 4 years ago
- Why fuzzing with emulators is amazing☆141Updated 5 years ago
- Clang instrumentation module for tracing variable and buffer comparisons in C/C++ and saving the coverage data to .sancov files☆202Updated 6 years ago
- Janus: a state-of-the-art file system fuzzer on Linux☆231Updated 5 years ago
- Target-centric program analysis.☆77Updated last week
- Security-related flags and options for C compilers☆198Updated 3 years ago
- Bug hunting through fuzzer/*-sanitizer/etc...☆133Updated 4 years ago
- LKRG bypass methods☆73Updated 5 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆365Updated 7 months ago