ucsb-seclab / heapster
Identify and test the security of dynamic memory allocators in monolithic firmware images
☆42Updated last year
Alternatives and similar repositories for heapster:
Users that are interested in heapster are comparing it to the libraries listed below
- ☆34Updated last year
- angr's exploration technique to perform taint analysis☆61Updated 5 years ago
- Material and examples for a presentation on static binary analysis.☆42Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆101Updated 2 years ago
- Symbolic Execution Over Processor Traces☆120Updated 8 months ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆80Updated 2 years ago
- A regression greybox fuzzer aflchurn☆66Updated 2 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆65Updated 3 years ago
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- ☆27Updated 2 years ago
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- ☆36Updated 4 years ago
- ☆54Updated 11 months ago
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- A data-flow-guided fuzzer☆119Updated last year
- ☆77Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆88Updated 11 months ago
- ☆53Updated 5 years ago
- ☆75Updated 3 years ago
- fuzzing + concolic = fuzzolic :)☆120Updated last week
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- ☆66Updated 5 years ago
- ☆14Updated 2 years ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆29Updated 10 months ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆59Updated 5 months ago
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- ☆32Updated 3 years ago
- ☆24Updated last year
- ☆98Updated 4 years ago
- ☆34Updated last year