jinb-park / kfuzz
A bunch of sample codes related to kernel fuzzing
☆12Updated 6 years ago
Alternatives and similar repositories for kfuzz:
Users that are interested in kfuzz are comparing it to the libraries listed below
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆38Updated 4 years ago
- Tutorial to write qemu plugins☆31Updated 7 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆149Updated 3 years ago
- K-Miner☆75Updated 5 years ago
- ☆25Updated 6 years ago
- ☆37Updated 2 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆21Updated 2 years ago
- ☆70Updated 5 years ago
- ☆25Updated 2 years ago
- ☆64Updated 5 years ago
- ☆96Updated 5 years ago
- AFLTeam Collaborative Parallel Fuzzing☆73Updated 2 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆35Updated 3 months ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆136Updated 3 years ago
- A regression greybox fuzzer aflchurn☆65Updated 2 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 2 months ago
- Official repository of SyzRisk [ASIA CCS'24]☆10Updated 6 months ago
- Basic LLVM passes☆17Updated 6 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆46Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 3 weeks ago
- Fuzzing Parsers with Tokens☆32Updated 4 years ago
- ☆17Updated 5 years ago
- The parser-directed Fuzzer☆38Updated 4 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆34Updated 3 years ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication☆12Updated 2 years ago