niklasb / dump-seccompLinks
GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)
☆22Updated 9 years ago
Alternatives and similar repositories for dump-seccomp
Users that are interested in dump-seccomp are comparing it to the libraries listed below
Sorting:
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆96Updated 6 years ago
- ☆53Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Utilities for generating dynamic traces☆92Updated 3 months ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 2 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- ☆24Updated last year
- My AddressSanitizer implementation in C☆27Updated 4 years ago
- Library to wrap all file calls when fuzzing with AFL++☆50Updated 2 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆15Updated 4 years ago
- ☆14Updated 3 years ago
- Flex 'em lexers☆40Updated 4 years ago
- ☆38Updated 4 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 3 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- run AFL with dynamorio☆37Updated 4 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆80Updated 3 weeks ago
- ☆19Updated 7 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- exploit code for a bpf heap overflow vulnerability☆27Updated 5 years ago
- ☆98Updated 4 years ago