richinseattle / EvolutionaryKernelFuzzing
Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017
☆68Updated 7 years ago
Alternatives and similar repositories for EvolutionaryKernelFuzzing:
Users that are interested in EvolutionaryKernelFuzzing are comparing it to the libraries listed below
- A Fuzzer for Windows NDIS Drivers OID Handlers☆93Updated 3 years ago
- ☆45Updated 7 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- ☆33Updated 9 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- exploit development☆49Updated 7 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆47Updated 8 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- ☆44Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- Collection of pin tools☆51Updated 9 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 7 years ago
- ☆87Updated 9 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆26Updated 13 years ago
- ☆48Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆61Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- ☆91Updated 5 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆39Updated 4 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago