vlad902 / kernel-uninitialized-memory-checker
A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.
☆59Updated 6 years ago
Alternatives and similar repositories for kernel-uninitialized-memory-checker:
Users that are interested in kernel-uninitialized-memory-checker are comparing it to the libraries listed below
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 7 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- Test case minimizer for afl-fuzz☆26Updated 7 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 11 years ago
- just an experiment☆21Updated 6 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- De Mysteriis Dom jemalloc☆65Updated 7 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Updated 8 years ago
- ☆71Updated 5 years ago
- An XNU kernel fuzz tool☆22Updated 15 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 3 years ago
- ☆31Updated 4 years ago
- BPF Processor for IDA Python☆51Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- ☆17Updated 5 years ago
- A monitoring script for AFL☆39Updated 8 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 8 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- run AFL with pintool☆65Updated 5 years ago
- Recover control flow graph from obfuscated codes☆38Updated 9 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- ☆25Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- ☆28Updated 4 years ago
- ☆16Updated 7 years ago
- Signedness-Agnostic Strided-Interval☆36Updated 5 years ago
- Re-randomizing the memory layout of a process at runtime☆21Updated 8 years ago