googleprojectzero / SkCodecFuzzerLinks
Fuzzing harness for testing proprietary image codecs supported by Skia on Android
☆348Updated 4 years ago
Alternatives and similar repositories for SkCodecFuzzer
Users that are interested in SkCodecFuzzer are comparing it to the libraries listed below
Sorting:
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆574Updated 5 years ago
- ☆173Updated 4 years ago
- Exploits for Android Binder bug CVE-2020-0041☆240Updated 5 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆342Updated 5 years ago
- Frida-based general purpose fuzzer☆217Updated 4 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆229Updated 5 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆280Updated 3 months ago
- Corpus of public v8 vulnerability PoCs.☆213Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- AFL binary instrumentation☆299Updated 5 months ago
- A Binary Ninja plugin for vulnerability research.☆294Updated 9 months ago
- FANS: Fuzzing Android Native System Services☆255Updated 4 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆346Updated last year
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆338Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆301Updated 2 years ago
- Fuzzer for Linux Kernel Drivers☆379Updated 3 years ago
- ☆282Updated 5 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆337Updated 6 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆386Updated 2 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- ☆224Updated 4 years ago
- INFILTRATE 2019 Demo Materials☆339Updated 2 years ago
- SSD Secure Disclosure Advisories☆169Updated 5 years ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆345Updated 10 months ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆208Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆195Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra☆292Updated 11 months ago
- Write-ups from A*0*E.☆197Updated 5 years ago