vusec / ghostrace
☆69Updated 11 months ago
Alternatives and similar repositories for ghostrace:
Users that are interested in ghostrace are comparing it to the libraries listed below
- Blogpost about optimizing binary-only fuzzing with AFL++☆63Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆55Updated 9 months ago
- Linux Kernel Fuzzer Corpus☆132Updated this week
- Uncovering Container Confusion in the Linux Kernel☆43Updated 11 months ago
- Binary exploitation by confusing the unwinder☆59Updated last year
- PoC of fuzzing closed-source userspace binaries with KVM☆163Updated 9 months ago
- ☆101Updated 4 months ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆117Updated 8 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆55Updated 3 months ago
- ☆166Updated last week
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆149Updated last year
- A tool combining DWARF info and source to search for kernel heap objects☆22Updated 11 months ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Targeting Windows Kernel Driver Fuzzer☆157Updated last week
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆72Updated this week
- ☆76Updated last year
- ☆57Updated 9 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆111Updated last month
- ☆37Updated 10 months ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆37Updated 6 months ago
- Spectre based on Linear Address Masking☆68Updated last year
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆50Updated last year
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆30Updated 2 months ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆59Updated 2 months ago
- Linux kernel privilege escalation techniques☆125Updated 6 months ago
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆47Updated 2 months ago
- ☆123Updated 9 months ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆75Updated 2 years ago
- ☆87Updated 4 months ago