googleprojectzero / SkCodecFuzzer
Fuzzing harness for testing proprietary image codecs supported by Skia on Android
☆348Updated 4 years ago
Alternatives and similar repositories for SkCodecFuzzer:
Users that are interested in SkCodecFuzzer are comparing it to the libraries listed below
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆572Updated 4 years ago
- ☆172Updated 4 years ago
- Frida-based general purpose fuzzer☆215Updated 4 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆227Updated 4 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆343Updated 5 years ago
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- Exploits for Android Binder bug CVE-2020-0041☆234Updated 5 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆276Updated 2 months ago
- Corpus of public v8 vulnerability PoCs.☆211Updated 3 years ago
- Binary code coverage visualizer plugin for Ghidra☆290Updated 10 months ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆300Updated 2 years ago
- ☆283Updated 5 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆207Updated 3 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆182Updated 4 years ago
- ☆336Updated 8 months ago
- INFILTRATE 2019 Demo Materials☆339Updated 2 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆505Updated 2 months ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆338Updated 4 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆607Updated last year
- Use angr in the IDA Pro debugger generating a state from the current debug session☆277Updated 4 years ago
- Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S…☆249Updated 4 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆335Updated 6 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆198Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆222Updated 4 years ago
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆208Updated 2 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆152Updated 6 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆147Updated last year