vlad902 / kernel-uninitialized-memory-checker
A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.
☆59Updated 6 years ago
Alternatives and similar repositories for kernel-uninitialized-memory-checker:
Users that are interested in kernel-uninitialized-memory-checker are comparing it to the libraries listed below
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 7 years ago
- run AFL with pintool☆65Updated 5 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Test case minimizer for afl-fuzz☆26Updated 7 years ago
- ☆53Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 10 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 11 years ago
- ☆18Updated 5 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Updated 8 years ago
- ☆70Updated 5 years ago
- ☆31Updated 4 years ago
- A monitoring script for AFL☆39Updated 8 years ago
- ☆16Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 7 years ago
- Source code for building an exploitable linux kernel challenge iso.☆44Updated 11 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- Tutorial to write qemu plugins☆31Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- just an experiment☆21Updated 6 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 3 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 4 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- ☆96Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago