wpengfei / double_fetch_cocci
Source code of the double-fetch bug detection approach based on Coccinelle engine
☆10Updated 8 years ago
Alternatives and similar repositories for double_fetch_cocci:
Users that are interested in double_fetch_cocci are comparing it to the libraries listed below
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- ☆53Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- exploit code for a bpf heap overflow vulnerability☆27Updated 5 years ago
- Recover mutation graph from an AFL seed☆60Updated 4 years ago
- ☆19Updated 6 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- ☆13Updated 3 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆29Updated 6 years ago
- The collection of programs for evaluating fuzzing techniques☆20Updated 7 years ago
- ☆71Updated 5 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- ☆20Updated 3 years ago
- Signedness-Agnostic Strided-Interval☆36Updated 5 years ago
- blog☆16Updated 5 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 9 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆15Updated 4 years ago
- run AFL with pintool☆66Updated 5 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- ☆16Updated 7 years ago
- 2019 Advent Calendar, vmware pwnables☆49Updated 4 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- Corpus set used by DIE☆40Updated 4 years ago
- Stony Brook University CFI library☆21Updated 10 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆44Updated 4 years ago