GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)
☆22Mar 13, 2016Updated 10 years ago
Alternatives and similar repositories for dump-seccomp
Users that are interested in dump-seccomp are comparing it to the libraries listed below
Sorting:
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 3 months ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Mar 5, 2018Updated 8 years ago
- ☆17May 13, 2019Updated 6 years ago
- ☆13Mar 5, 2019Updated 7 years ago
- Playground for testing feedback☆16Aug 12, 2020Updated 5 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Jan 5, 2019Updated 7 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Jul 14, 2022Updated 3 years ago
- ☆95Apr 2, 2019Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆141Aug 17, 2021Updated 4 years ago
- Recover mutation graph from an AFL seed☆60Jan 6, 2021Updated 5 years ago
- IDA script for parsing kallsyms☆86Dec 8, 2025Updated 3 months ago
- ☆33Apr 4, 2022Updated 3 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- you can use frida in jeb !☆47Sep 25, 2022Updated 3 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 3 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- X/Y o-scope simulator for playing audio waveforms☆17Nov 28, 2015Updated 10 years ago
- Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.☆139Aug 23, 2024Updated last year
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Oct 31, 2022Updated 3 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆161Aug 31, 2022Updated 3 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- PoCs/Examples for my guest post on doar-e☆19Nov 27, 2014Updated 11 years ago