kkamagui / alcatrazLinks
Alcatraz project for Black Hat USA 2021
☆78Updated 4 years ago
Alternatives and similar repositories for alcatraz
Users that are interested in alcatraz are comparing it to the libraries listed below
Sorting:
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆164Updated 4 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated 2 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- ☆92Updated 6 months ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 3 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆127Updated 5 years ago
- A kAFL based hypervisor fuzzer which fully supports nested VMs☆143Updated 4 years ago
- ☆59Updated 5 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆29Updated 2 years ago
- ☆38Updated last year
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- Linux kernel branches for confidential compute research☆20Updated 8 months ago
- ☆137Updated 4 years ago
- A library for patching ELFs☆60Updated 5 years ago
- tool for multi-execution jump coverage introspection☆68Updated 10 months ago
- LKRG bypass methods☆73Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- ☆50Updated 3 years ago
- Binary exploitation by confusing the unwinder☆67Updated 2 years ago
- POC for Phantom Attack☆88Updated 3 years ago
- ☆98Updated 3 years ago
- ☆45Updated 3 years ago
- kAFL Fuzzer☆34Updated 9 months ago
- Communication through a serial port or named pipe☆57Updated 2 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆157Updated 4 years ago
- ☆102Updated 3 years ago
- ☆19Updated 3 years ago