ucsb-seclab / heapsterLinks
Identify and test the security of dynamic memory allocators in monolithic firmware images
☆44Updated last year
Alternatives and similar repositories for heapster
Users that are interested in heapster are comparing it to the libraries listed below
Sorting:
- Material and examples for a presentation on static binary analysis.☆45Updated 4 years ago
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆84Updated 3 years ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- ☆55Updated last year
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- A data-flow-guided fuzzer☆122Updated last year
- ☆37Updated 2 years ago
- ☆36Updated last year
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆80Updated 6 months ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆202Updated 3 years ago
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- ☆78Updated last year
- The Use of Likely Invariants as Feedback for Fuzzers☆89Updated 3 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆188Updated last year
- Symbolic Execution Over Processor Traces☆122Updated 11 months ago
- ☆90Updated 3 years ago
- ☆28Updated 3 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆63Updated last year
- fuzzing + concolic = fuzzolic :)☆124Updated 2 months ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆29Updated last year
- ☆67Updated 5 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- ☆36Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90Updated last year
- ☆75Updated 2 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆61Updated 8 months ago
- afl/afl++ with a hierarchical seed scheduler☆56Updated 3 years ago