ha1vk / blackhat_wasmLinks
blackhat usa 2022 I attended
☆73Updated 3 years ago
Alternatives and similar repositories for blackhat_wasm
Users that are interested in blackhat_wasm are comparing it to the libraries listed below
Sorting:
- fuzz the linux kernel bpf verifier☆83Updated 3 years ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆47Updated 2 years ago
- ☆102Updated 4 years ago
- JavaScript Fuzzing framework for v8☆138Updated 3 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊 测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆45Updated 3 years ago
- ☆34Updated 3 years ago
- A tool for effective testing the binding layer of scripting languages☆79Updated 3 years ago
- ☆41Updated last year
- ☆32Updated 2 years ago
- rust ctf writeups(Rust CTF解题报告)☆51Updated 3 years ago
- ☆65Updated 3 years ago
- QEMU escape code☆62Updated 4 years ago
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- Companion repository to the Fuzzing101 with LibAFL series of blog posts.☆157Updated 7 months ago
- a browser fuzzer☆40Updated last year
- some kernel exploit challenges and cve analysis☆26Updated 6 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆73Updated 2 months ago
- ☆93Updated last year
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last year
- A gdb for fuzzing☆21Updated 3 years ago
- ☆56Updated 3 years ago
- ☆36Updated last year
- AFLplusplus + libprotobuf-mutator☆59Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆37Updated 10 months ago
- A toy Fuzzer for wasm fuzzing based on fuzzilli☆72Updated 3 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 2 years ago
- ☆132Updated last year
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- Some Vulnerability in the some protocol are collected.☆104Updated last year