vlad902 / kernel-intoverflow-taint-checkerLinks
A hacky clang analyzer checker that looks for potentially exploitable kernel integer overflows.
☆20Updated 7 years ago
Alternatives and similar repositories for kernel-intoverflow-taint-checker
Users that are interested in kernel-intoverflow-taint-checker are comparing it to the libraries listed below
Sorting:
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Updated 6 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- PoC code for CVE-2018-9539☆20Updated 6 years ago
- Tools released in CSS 2019☆38Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- Ditto.☆18Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 8 years ago
- ☆31Updated 5 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Updated 2 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Updated 5 years ago
- PoC for CVE-2017-0075☆37Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Updated 6 years ago
- ☆28Updated 4 years ago
- View Linux perf traces in IDA Pro☆14Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- Magellan PoC☆34Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago