jinb-park / kfuzz
A bunch of sample codes related to kernel fuzzing
☆12Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for kfuzz
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆144Updated 3 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆135Updated 3 years ago
- ☆25Updated 6 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆57Updated last year
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆72Updated last year
- ☆20Updated 3 years ago
- ☆43Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 6 months ago
- A regression greybox fuzzer aflchurn☆64Updated 2 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- ☆95Updated 5 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- ☆37Updated 2 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆86Updated 2 years ago
- Source code release for the KRace project☆27Updated 3 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆97Updated 2 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆34Updated 2 years ago
- ☆24Updated 2 years ago
- ☆22Updated 4 years ago
- ☆46Updated 3 years ago
- ☆68Updated 4 years ago
- Tutorial to write qemu plugins☆31Updated 7 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated last year
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆41Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- ☆14Updated 3 years ago
- afl/afl++ with a hierarchical seed scheduler☆57Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- ☆64Updated 5 years ago