vusec / ghostraceLinks
☆74Updated last year
Alternatives and similar repositories for ghostrace
Users that are interested in ghostrace are comparing it to the libraries listed below
Sorting:
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆60Updated last year
- NDSS 2020 - HYPER-CUBE: High-Dimensional Hypervisor Fuzzing☆63Updated 2 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆64Updated last year
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- Linux Kernel Fuzzer Corpus☆142Updated this week
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆122Updated last year
- Spectre based on Linear Address Masking☆69Updated last year
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- ☆15Updated 6 months ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆74Updated last month
- Same-Architecture Firmware Rehosting and Fuzzing☆126Updated 6 months ago
- ☆78Updated last year
- Linux kernel privilege escalation techniques☆138Updated 10 months ago
- ☆178Updated 4 months ago
- Practical Data-Only Attack Generation☆40Updated last year
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆152Updated last year
- ☆43Updated last month
- Damn Vulenerable Kernel Module for kernel fuzzing☆62Updated 7 months ago
- Code snippets for Binary Ninja's Python API☆28Updated 4 years ago
- Target components for kAFL/Nyx Fuzzer☆30Updated 2 months ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆35Updated 6 months ago
- ☆183Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆82Updated 3 years ago
- POC for Phantom Attack☆83Updated 2 years ago
- Linux kernel source tree☆18Updated last month
- ☆135Updated last year
- A tool combining DWARF info and source to search for kernel heap objects☆24Updated last year