chenyueqi / SLAKEView external linksLinks
☆38Nov 30, 2020Updated 5 years ago
Alternatives and similar repositories for SLAKE
Users that are interested in SLAKE are comparing it to the libraries listed below
Sorting:
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- ☆26May 10, 2021Updated 4 years ago
- ☆12Apr 23, 2021Updated 4 years ago
- K-Miner☆74Jun 5, 2019Updated 6 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- Collection of syzkaller bug reproducers for Linux☆43May 16, 2022Updated 3 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 6 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- ☆81Sep 7, 2023Updated 2 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆96Mar 29, 2023Updated 2 years ago
- Syzkaller with MAB scheduling and seed selection☆27Jan 29, 2020Updated 6 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 2 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆63Dec 2, 2024Updated last year
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- ☆13Oct 17, 2021Updated 4 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆84Jun 15, 2025Updated 7 months ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Mar 3, 2021Updated 4 years ago
- ☆69Mar 27, 2019Updated 6 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- DBGBench Website:☆19Feb 24, 2021Updated 4 years ago
- ☆20Jun 7, 2025Updated 8 months ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 5 months ago
- ☆19Dec 9, 2022Updated 3 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- A tool for easy manage a pwn server☆17Oct 29, 2018Updated 7 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Feb 28, 2023Updated 2 years ago
- ☆37Nov 16, 2023Updated 2 years ago