therealdreg / bochs_linux_kernel_debuggingLinks
Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)
☆31Updated 2 years ago
Alternatives and similar repositories for bochs_linux_kernel_debugging
Users that are interested in bochs_linux_kernel_debugging are comparing it to the libraries listed below
Sorting:
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- ☆37Updated last year
- Dice CTF 2022 breach write-up☆15Updated 3 years ago
- ☆82Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆30Updated 3 years ago
- Target components for kAFL/Nyx Fuzzer☆35Updated last year
- ☆34Updated 4 years ago
- ☆41Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- ☆18Updated 3 years ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆162Updated 3 years ago
- Python bindings for BochsCPU☆37Updated 2 weeks ago
- IDA (sort of) headless☆25Updated last year
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- ☆27Updated 10 months ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- ☆14Updated 5 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆43Updated 3 years ago
- ☆47Updated 2 years ago
- ☆35Updated 4 years ago
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆37Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- An IDA processor for eBPF bytecode☆67Updated 9 months ago
- ☆13Updated 3 years ago