vlad902 / kernel-uninitialized-memory-checkerLinks
A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.
☆59Updated 6 years ago
Alternatives and similar repositories for kernel-uninitialized-memory-checker
Users that are interested in kernel-uninitialized-memory-checker are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- ☆31Updated 5 years ago
- Source code for building an exploitable linux kernel challenge iso.☆46Updated 11 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 7 years ago
- run AFL with pintool☆66Updated 5 years ago
- Test case minimizer for afl-fuzz☆26Updated 7 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 12 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- BPF Processor for IDA Python☆52Updated 6 years ago
- ☆17Updated 6 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Updated 8 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- ☆16Updated 7 years ago
- just an experiment☆22Updated 6 years ago
- Signedness-Agnostic Strided-Interval☆37Updated 6 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- exploit code for a bpf heap overflow vulnerability☆27Updated 5 years ago
- Recover control flow graph from obfuscated codes☆38Updated 9 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 5 years ago
- vm escape exploit☆39Updated 7 years ago
- ☆16Updated 7 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- PoC code for CVE-2017-13253☆38Updated 4 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago