saaramar / security_analysis_mte
☆48Updated 3 years ago
Alternatives and similar repositories for security_analysis_mte
Users that are interested in security_analysis_mte are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- ☆56Updated 2 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- ☆78Updated 2 months ago
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- A library for patching ELFs☆55Updated 4 years ago
- ☆61Updated 2 months ago
- ☆28Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆52Updated last year
- Ghidra analyzer for UEFI firmware.☆18Updated last year
- binary ninja related code☆35Updated last month
- Breaking Secure Boot with SMM☆40Updated 3 years ago
- Some presentations I did in the past☆65Updated 2 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- CodeQL + DTrace = Memory Disclosure Vulnerabilities in XNU☆48Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated last month
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆58Updated 2 years ago
- ☆85Updated last year
- ☆81Updated 2 years ago
- WTF Snapshot fuzzing of macOS targets☆95Updated 11 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- ☆72Updated 3 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Updated 6 months ago
- A code-searching/completion tool, for IDA APIs☆83Updated 3 months ago
- ☆35Updated 3 years ago