☆66Mar 18, 2026Updated this week
Alternatives and similar repositories for kernel-research
Users that are interested in kernel-research are comparing it to the libraries listed below
Sorting:
- Deterministic record and replay and tracing of syzkaller bug reproducers☆20Apr 25, 2025Updated 10 months ago
- OCaml hacking ideas, small and large.☆20Apr 9, 2024Updated last year
- ☆17Aug 25, 2022Updated 3 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- 🦖 Reconstruct Types from Binary Code☆48Nov 21, 2025Updated 4 months ago
- ☆33Nov 30, 2024Updated last year
- ☆50Mar 12, 2026Updated last week
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆94Aug 25, 2024Updated last year
- some kernel pwn practice questions.☆25Nov 25, 2024Updated last year
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆52Jan 29, 2026Updated last month
- ☆273Aug 2, 2025Updated 7 months ago
- An OCaml extension for RISC-V☆16Nov 6, 2020Updated 5 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆37Oct 17, 2025Updated 5 months ago
- Collection of scripts to analyse the Linux kernel☆10Aug 25, 2019Updated 6 years ago
- Automatic use of House of Some & House of Illusion.☆85Sep 9, 2025Updated 6 months ago
- Linux kernel privilege escalation techniques☆153Aug 9, 2024Updated last year
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨☆45Jul 18, 2024Updated last year
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆13Mar 9, 2022Updated 4 years ago
- Multi-Server PIR (CCSW'14)☆11Dec 2, 2020Updated 5 years ago
- ☆42Oct 10, 2025Updated 5 months ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- Slides from Off-By-One Conferences☆34Sep 9, 2024Updated last year
- A CTF fuzz powerd by protobuf.☆15May 24, 2022Updated 3 years ago
- This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear…☆22Jan 26, 2025Updated last year
- RISC-V BSV Specification☆23Jan 18, 2020Updated 6 years ago
- Emulating firmware poorly but quickly!☆16Dec 18, 2020Updated 5 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- A book about datalog☆12Nov 26, 2022Updated 3 years ago
- epub2sphinx is a tool to convert epub files to ReST for Sphinx☆11Apr 8, 2023Updated 2 years ago
- ☆20Feb 9, 2026Updated last month
- An open-source benchmark for evaluating AI agents' ability to find backdoors hidden in compiled binaries.☆74Feb 27, 2026Updated 3 weeks ago
- IEEE S&P 2023 - DEVFUZZ: Automatic Device Model-Guided Device Driver Fuzzing☆14Dec 16, 2024Updated last year
- ☆43Jun 28, 2025Updated 8 months ago
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 7 months ago
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Oct 31, 2022Updated 3 years ago
- 一个提取自linux addr2line命令的库。☆12Mar 3, 2022Updated 4 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago