diff options
| author | he1001 | 2020-01-01 20:25:31 +0800 |
|---|---|---|
| committer | Andrey Konovalov | 2020-01-01 13:25:31 +0100 |
| commit | 1d25ba15db4d3b45a61a0a01ad4bf4b262600728 (patch) | |
| tree | dcb44dce942327552cecb34d6c7eac17b16c70be | |
| parent | 7e1f2cb1a953c5360b896f70bb485929376fd143 (diff) | |
Small fixes and additions (#22)
| -rw-r--r-- | README.md | 14 |
1 files changed, 8 insertions, 6 deletions
| @@ -499,8 +499,6 @@ Marek Majkowski](https://blog.cloudflare.com/a-gentle-introduction-to-linux-kern | |||
| 499 | 499 | ||
| 500 | [2019: "Hourglass Fuzz: A Quick Bug Hunting Method"](https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Hourglass%20Fuzz%20-%20A%20Quick%20Bug%20Hunting%20Method%20-%20Moony%20Li,%20Todd%20Han,%20Lance%20Jiang%20&%20Lilang%20Wu.pdf) [slides] | 500 | [2019: "Hourglass Fuzz: A Quick Bug Hunting Method"](https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Hourglass%20Fuzz%20-%20A%20Quick%20Bug%20Hunting%20Method%20-%20Moony%20Li,%20Todd%20Han,%20Lance%20Jiang%20&%20Lilang%20Wu.pdf) [slides] |
| 501 | 501 | ||
| 502 | [2019: "Fuzzing File Systems via Two-Dimensional Input Space Exploration"](https://taesoo.kim/pubs/2019/xu:janus.pdf) [paper] | ||
| 503 | |||
| 504 | [2018: "RAZZER: Finding Kernel Race Bugs through Fuzzing"](https://lifeasageek.github.io/papers/jeong:razzer.pdf) [paper] | 502 | [2018: "RAZZER: Finding Kernel Race Bugs through Fuzzing"](https://lifeasageek.github.io/papers/jeong:razzer.pdf) [paper] |
| 505 | 503 | ||
| 506 | [2018: "FastSyzkaller: Improving Fuzz Efficiency for Linux Kernel Fuzzing"](https://iopscience.iop.org/article/10.1088/1742-6596/1176/2/022013/pdf) [paper] | 504 | [2018: "FastSyzkaller: Improving Fuzz Efficiency for Linux Kernel Fuzzing"](https://iopscience.iop.org/article/10.1088/1742-6596/1176/2/022013/pdf) [paper] |
| @@ -580,10 +578,12 @@ https://github.com/schumilo/vUSBf | |||
| 580 | 578 | ||
| 581 | https://github.com/ucsb-seclab/difuze | 579 | https://github.com/ucsb-seclab/difuze |
| 582 | 580 | ||
| 583 | https://github.com/compsec-snu/razzer | 581 | https://github.com/compsec-snu/razzer (race vulnerability detection) |
| 584 | 582 | ||
| 585 | https://github.com/fgsect/unicorefuzz | 583 | https://github.com/fgsect/unicorefuzz |
| 586 | 584 | ||
| 585 | https://github.com/shankarapailoor/moonshine (seed input distill) | ||
| 586 | |||
| 587 | 587 | ||
| 588 | ## Exploits | 588 | ## Exploits |
| 589 | 589 | ||
| @@ -593,9 +593,9 @@ https://github.com/offensive-security/exploit-database/tree/master/platforms/lin | |||
| 593 | 593 | ||
| 594 | https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux+kernel&colspec=ID+Type+Status+Priority+Milestone+Owner+Summary&cells=ids | 594 | https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux+kernel&colspec=ID+Type+Status+Priority+Milestone+Owner+Summary&cells=ids |
| 595 | 595 | ||
| 596 | http://vulnfactory.org/exploits/ | 596 | http://vulnfactory.org/exploits/ (year 2010 and 2011) |
| 597 | 597 | ||
| 598 | https://www.kernel-exploits.com/ | 598 | https://www.kernel-exploits.com/ (can not open) |
| 599 | 599 | ||
| 600 | https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs | 600 | https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs |
| 601 | 601 | ||
| @@ -629,7 +629,9 @@ https://github.com/brl/grlh | |||
| 629 | 629 | ||
| 630 | https://github.com/externalist/exploit_playground | 630 | https://github.com/externalist/exploit_playground |
| 631 | 631 | ||
| 632 | https://github.com/ww9210/Linux_kernel_exploits | 632 | https://github.com/ww9210/Linux_kernel_exploits (FUZE) |
| 633 | |||
| 634 | https://github.com/ww9210/kepler-cfhp (KEPLER) | ||
| 633 | 635 | ||
| 634 | https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack | 636 | https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack |
| 635 | 637 | ||
