saaramar / security_analysis_mteLinks
☆48Updated 3 years ago
Alternatives and similar repositories for security_analysis_mte
Users that are interested in security_analysis_mte are comparing it to the libraries listed below
Sorting:
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- ☆57Updated 2 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 4 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- WTF Snapshot fuzzing of macOS targets☆96Updated last year
- ☆82Updated 2 years ago
- ☆28Updated 2 years ago
- Some presentations I did in the past☆65Updated 2 years ago
- binary ninja related code☆35Updated 4 months ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆58Updated 2 years ago
- ☆64Updated 5 months ago
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- ☆47Updated 2 years ago
- ☆13Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- Linux Kernel N-day Exploit/Analysis.☆66Updated 9 months ago
- Research related☆89Updated 3 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- CTF challenges that I created☆18Updated 3 years ago
- ☆18Updated 3 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated last month
- ☆85Updated last year
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Extreme Vulnerable IOKit driver☆92Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago