vmware-archive / vmmfuzzerLinks
A hypervisor or virtual machine monitor (VMM) fuzzer
☆28Updated 5 years ago
Alternatives and similar repositories for vmmfuzzer
Users that are interested in vmmfuzzer are comparing it to the libraries listed below
Sorting:
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- ☆14Updated 7 years ago
- vm escape exploit☆39Updated 7 years ago
- libs2e.so☆20Updated 4 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- ☆31Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆35Updated 7 years ago
- Microsoft Edge MemGC Internals☆17Updated 9 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- everyone can fuzz h2☆24Updated 6 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- ELF/PE/Mach-O parsing library☆50Updated last year
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 7 years ago
- deprecated☆46Updated 6 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago
- IDA PDB Loader☆47Updated 6 years ago
- VMI on BitVisor to detect hidden rootkits.☆26Updated 8 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- radare2 cLEMENCy plugins☆24Updated 7 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Updated 12 years ago
- Recover control flow graph from obfuscated codes☆38Updated 10 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- Triton based R2 plugin for concolic execution and total control☆32Updated 6 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago