pjlantz / optee-qemuLinks
Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)
☆76Updated 3 years ago
Alternatives and similar repositories for optee-qemu
Users that are interested in optee-qemu are comparing it to the libraries listed below
Sorting:
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆161Updated 3 years ago
- AFL bindings for Unicorn-Engine☆80Updated this week
- ☆58Updated 5 months ago
- ☆98Updated 2 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- A kAFL based hypervisor fuzzer which fully supports nested VMs☆142Updated 3 years ago
- Target components for kAFL/Nyx Fuzzer☆34Updated last year
- Snapshot fuzzing with KVM and LibAFL☆96Updated 2 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- ☆36Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 2 years ago
- trustonic tbase research☆31Updated 7 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- ☆47Updated 3 years ago
- ☆82Updated 2 years ago
- IDA script for parsing kallsyms☆80Updated 2 weeks ago
- ☆28Updated 2 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆60Updated last year
- Research related☆88Updated 3 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆76Updated 2 years ago
- ☆149Updated last month
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago
- QEMU escape code☆62Updated 4 years ago
- A firmware base address search tool.☆45Updated last year
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- ☆34Updated 3 years ago
- qemu vulnerablity.☆53Updated 4 years ago