andreafioraldi / asan-gioveseLinks
My AddressSanitizer implementation in C
☆28Updated 4 years ago
Alternatives and similar repositories for asan-giovese
Users that are interested in asan-giovese are comparing it to the libraries listed below
Sorting:
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 9 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Library to wrap all file calls when fuzzing with AFL++☆50Updated 2 years ago
- run AFL with dynamorio☆37Updated 5 years ago
- ☆53Updated 6 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 3 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆15Updated 4 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- ☆96Updated 6 years ago
- exploit code for a bpf heap overflow vulnerability☆27Updated 5 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆10Updated 4 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- ☆38Updated 5 years ago
- ☆13Updated 3 years ago
- Source code for building an exploitable linux kernel challenge iso.☆46Updated 11 years ago
- ☆19Updated 7 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Updated 8 years ago
- Automated recovery of Linux kernel build configurations☆24Updated 3 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 5 years ago
- ☆58Updated 4 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- ☆48Updated 3 years ago
- ☆25Updated last year
- ☆31Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- ☆29Updated 2 years ago