Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization
☆145Jul 22, 2016Updated 9 years ago
Alternatives and similar repositories for xenpwn
Users that are interested in xenpwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tracing framework for full system simulators☆57Sep 9, 2015Updated 10 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Dec 1, 2017Updated 8 years ago
- Cross Platform Kernel Fuzzer Framework☆455Oct 11, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Mar 17, 2015Updated 11 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Jan 5, 2019Updated 7 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆126Jan 15, 2019Updated 7 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- An amd64 symbolic emulator☆314Aug 28, 2021Updated 4 years ago
- A branch-monitor-based solution for process monitoring.