vusec / uncontainedLinks
Uncovering Container Confusion in the Linux Kernel
☆46Updated last year
Alternatives and similar repositories for uncontained
Users that are interested in uncontained are comparing it to the libraries listed below
Sorting:
- ☆27Updated last year
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Updated last year
- A hacky tool for analysing linux kernel commits☆38Updated 3 years ago
- WebGL fuzzer☆39Updated 2 years ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆74Updated 8 months ago
- Binary exploitation by confusing the unwinder☆68Updated 2 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- ☆58Updated 2 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆71Updated 2 years ago
- Target components for kAFL/Nyx Fuzzer☆34Updated 6 months ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Updated 2 months ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆91Updated last month
- ☆33Updated 2 years ago
- ☆70Updated 6 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆30Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20Updated last year
- ☆21Updated 2 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- ☆38Updated last year
- Repo for talk slides & materials☆21Updated last year
- ☆19Updated 7 months ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- Practical Data-Only Attack Generation☆44Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- ☆45Updated 3 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆154Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆129Updated last year