gamozolabs / mesosLinks
Binary coverage tool without binary modification for Windows
☆446Updated 5 years ago
Alternatives and similar repositories for mesos
Users that are interested in mesos are comparing it to the libraries listed below
Sorting:
- A hypervisor for fuzzing built with WHVP and Bochs☆380Updated 6 years ago
- Snapshot-based coverage-guided windows kernel fuzzer☆318Updated 4 years ago
- Have fun with the LowFragmentationHeap☆252Updated 4 years ago
- A fast Rust-based safe and thead-friendly grammar-based fuzz generator☆221Updated 5 years ago
- Binary Analysis Framework in Rust☆579Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra☆297Updated last year
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆335Updated 5 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆343Updated 6 years ago
- The fastest Intel-PT decoder for fuzzing☆376Updated last year
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆473Updated last year
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆220Updated 5 years ago
- Ghidra Program Analysis Library☆347Updated 2 years ago
- Winnie makes fuzzing Windows applications easy☆570Updated 3 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆520Updated 8 months ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆389Updated 3 years ago
- IDA Pro plugin to assist with complex graphs☆322Updated 2 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆608Updated 2 years ago
- A fuzzing introspection tool☆167Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Updated 3 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆735Updated 9 months ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆213Updated 4 years ago
- A Miasm2 based function divination.☆543Updated 5 years ago
- Why fuzzing with emulators is amazing☆142Updated 5 years ago
- ☆136Updated 4 years ago
- Binary Ninja Debugger Plugin☆143Updated 3 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆589Updated 7 years ago
- Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"☆314Updated 5 years ago
- PEDA-like debugger UI for WinDbg☆206Updated last year