googleprojectzero / BrokenTypeLinks
TrueType and OpenType font fuzzing toolset
☆436Updated 5 years ago
Alternatives and similar repositories for BrokenType
Users that are interested in BrokenType are comparing it to the libraries listed below
Sorting:
- Detect, analyze and uniquely identify crashes in Windows applications☆510Updated last month
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆338Updated 5 years ago
- Cross Platform Kernel Fuzzer Framework☆451Updated 6 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆305Updated 6 years ago
- A distributed fuzzing testing suite with web administration☆374Updated 6 years ago
- This project contains the source code for the CERT Basic Fuzzing Framework (BFF) and the CERT Failure Observation Engine (FOE).☆269Updated last year
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- Cross Architecture Shellcode in C☆203Updated 8 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- A user-friendly fuzzing and crash triage tool for Windows☆131Updated 5 years ago
- Content from presentation at BHUSA 2017☆181Updated 7 years ago
- Generation-based, context-free grammar fuzzer. Refer to https://github.com/posidron/dharma for a maintained version.☆492Updated 3 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Radare Congress Stuff☆212Updated 8 months ago
- A set of exploitation/reversing aids for IDA☆420Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆377Updated 6 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆337Updated 6 years ago
- gramfuzz is a grammar-based fuzzer that lets one define complex grammars to generate text and binary data formats.☆257Updated 4 years ago
- A Pwn2Own exploit chain☆761Updated 6 years ago
- Conference slides and White-papers☆357Updated 5 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- Project Zero Docs and Tools☆778Updated 2 months ago
- Checksec, but for Windows: static detection of security mitigations in executables☆592Updated 6 months ago
- Scripts for Binary Ninja☆257Updated 2 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 11 months ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago