vusec / ghostraceLinks
☆75Updated last year
Alternatives and similar repositories for ghostrace
Users that are interested in ghostrace are comparing it to the libraries listed below
Sorting:
- ☆27Updated last year
- Spectre based on Linear Address Masking☆68Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆129Updated last year
- Binary exploitation by confusing the unwinder☆68Updated 2 years ago
- ☆133Updated 2 weeks ago
- Practical Data-Only Attack Generation☆44Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Updated 2 months ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆154Updated 2 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆91Updated last month
- Blogpost about optimizing binary-only fuzzing with AFL++☆71Updated 2 years ago
- ☆70Updated 6 months ago
- A hacky tool for analysing linux kernel commits☆38Updated 3 years ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆132Updated last year
- Code snippets for Binary Ninja's Python API☆31Updated 4 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- PoC of fuzzing closed-source userspace binaries with KVM☆167Updated last year
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Updated last year
- Linux Kernel Fuzzer Corpus☆155Updated this week
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Updated last year
- NDSS 2020 - HYPER-CUBE: High-Dimensional Hypervisor Fuzzing☆67Updated 2 years ago
- ☆92Updated 7 months ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Updated 3 years ago
- ☆187Updated 2 years ago
- Files used for reproducing Fuzzware's experiments☆61Updated 2 years ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated 2 years ago
- ☆134Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20Updated last year
- InSpectre Gadget: in-depth inspection and exploitability analysis of Spectre disclosure gadgets☆59Updated this week
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆166Updated 4 years ago