nahueldsanchez / blogpost_qiling_dlink_2
Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated environment.
☆15Updated 4 years ago
Alternatives and similar repositories for blogpost_qiling_dlink_2:
Users that are interested in blogpost_qiling_dlink_2 are comparing it to the libraries listed below
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- ☆34Updated 3 years ago
- My Material for the HITB presentation☆35Updated 4 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- ☆30Updated 5 months ago
- adobe afdko fuzz☆41Updated 5 years ago
- ☆28Updated last year
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Updated 5 years ago
- ☆31Updated 4 years ago
- A Webkit RCE exploit and an SBX bug☆33Updated 5 years ago
- Magellan PoC☆34Updated 6 years ago
- ☆13Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- MacOS kernel memory leak (4 bytes)☆30Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Updated 6 years ago
- ☆74Updated 7 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- ☆12Updated 4 years ago
- ☆14Updated 2 years ago
- by http://whereisk0shl.top/☆35Updated 6 years ago
- Fuzzing SILK with AFL☆25Updated 4 years ago
- ☆22Updated 3 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago