ucsb-seclab / heapsterLinks
Identify and test the security of dynamic memory allocators in monolithic firmware images
☆47Updated 2 years ago
Alternatives and similar repositories for heapster
Users that are interested in heapster are comparing it to the libraries listed below
Sorting:
- Material and examples for a presentation on static binary analysis.☆46Updated 4 years ago
- A data-flow-guided fuzzer☆124Updated 2 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆83Updated 11 months ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- ☆57Updated last year
- A regression greybox fuzzer aflchurn☆67Updated 3 years ago
- ☆38Updated 5 years ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆206Updated 4 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- UAF Fuzzing Benchmark☆57Updated 4 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- ☆80Updated 2 years ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆56Updated last year
- Run fuzzing experiments in Docker☆32Updated 4 years ago
- ☆36Updated 2 years ago
- ☆37Updated 3 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated last year
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- ☆90Updated 4 years ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆33Updated last year
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆160Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- ☆11Updated 2 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆92Updated 3 years ago
- ☆29Updated last year
- ☆82Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- fuzzing + concolic = fuzzolic :)☆127Updated last month