googleprojectzero / SkCodecFuzzerLinks
Fuzzing harness for testing proprietary image codecs supported by Skia on Android
☆353Updated 5 years ago
Alternatives and similar repositories for SkCodecFuzzer
Users that are interested in SkCodecFuzzer are comparing it to the libraries listed below
Sorting:
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆579Updated 5 years ago
- Frida-based general purpose fuzzer☆221Updated 5 years ago
- ☆172Updated 5 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆343Updated 6 years ago
- Exploits for Android Binder bug CVE-2020-0041☆252Updated 5 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆288Updated 5 months ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 6 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Updated 3 years ago
- Fuzzer for Linux Kernel Drivers☆384Updated 3 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆149Updated 2 years ago
- ☆285Updated 5 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆185Updated 4 years ago
- My Chrome and Safari exploit code + write-up repo☆531Updated 4 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆335Updated 5 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆348Updated 2 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆235Updated 5 years ago
- SSD Secure Disclosure Advisories☆170Updated 5 years ago
- FANS: Fuzzing Android Native System Services☆262Updated 5 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆212Updated 4 years ago
- Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging☆456Updated last year
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- AFL binary instrumentation☆304Updated 11 months ago
- Corpus of public v8 vulnerability PoCs.☆222Updated 4 years ago
- Android application fuzzing framework with fuzzers and crash monitor.☆292Updated 5 years ago
- ☆444Updated last year
- Fuzzing Android program with american fuzzy lop (AFL)☆331Updated 7 years ago
- The Harvest of V8 regress.☆137Updated 5 years ago
- jemalloc heap exploitation framework☆465Updated 4 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆128Updated 8 years ago