cloudsec / akspLinks
Another kernel self protection
☆62Updated 5 years ago
Alternatives and similar repositories for aksp
Users that are interested in aksp are comparing it to the libraries listed below
Sorting:
- A function tracer☆92Updated 6 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- vm escape exploit☆39Updated 8 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- Suspended☆75Updated 9 years ago
- Seed Corpus for clamav-devel oss-fuzz integration.☆32Updated 6 years ago
- ☆41Updated 8 years ago
- ☆91Updated 9 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Updated 7 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- Use Intel Pin tools to analysis binary.☆38Updated 10 years ago
- ☆41Updated 9 years ago
- ☆25Updated 7 years ago
- Heap analysis tooling for ptmalloc☆46Updated 3 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 11 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- Materials from Fuzzing Bay Area meetups☆57Updated 6 years ago
- PoC for CVE-2017-0075☆37Updated 6 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Updated 9 years ago
- A DBI tool to discover heap memory related bugs☆126Updated 7 years ago
- ghidra scripts☆15Updated 4 years ago
- baseband security research☆84Updated 4 years ago
- Fast static binary instrumentation for linux/x86☆83Updated 8 years ago
- Process dump to executable ELF for linux☆106Updated 4 years ago
- Huawei mate 7 TrustZone exploit☆109Updated 10 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 6 years ago
- Resources About Dynamic Binary Instrumentation and Dynamic Binary Analysis☆138Updated 5 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago