jinb-park / linux-exploitLinks
linux-exploit
☆14Updated 6 years ago
Alternatives and similar repositories for linux-exploit
Users that are interested in linux-exploit are comparing it to the libraries listed below
Sorting:
- Collections of patterns for weggli to find nice bugs☆21Updated 2 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆84Updated 7 months ago
- Repo for fuzzing projects☆46Updated 5 years ago
- ☆32Updated 4 years ago
- A monitoring script for AFL☆40Updated 8 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 4 years ago
- Superion Mutator for AFLPlusPlus☆31Updated 2 years ago
- ☆28Updated 5 months ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆166Updated 4 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- 2019 Advent Calendar, vmware pwnables☆50Updated 5 years ago
- Investigating the bug behind CVE-2021-26708☆28Updated 4 years ago
- ☆31Updated 5 years ago
- Various debugging tools such as %DumpObjects for v8☆56Updated 7 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Updated 9 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 5 years ago
- ☆63Updated last month
- My Material for the HITB presentation☆35Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- adobe afdko fuzz☆41Updated 6 years ago
- ☆68Updated last year
- ☆45Updated 3 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Updated 4 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆58Updated 4 years ago
- some kernel exploit challenges and cve analysis☆26Updated 7 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 7 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- Virtual Inheritance Reverse Engineering☆18Updated 5 years ago