summaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorhe10012020-01-01 20:25:31 +0800
committerAndrey Konovalov2020-01-01 13:25:31 +0100
commit1d25ba15db4d3b45a61a0a01ad4bf4b262600728 (patch)
treedcb44dce942327552cecb34d6c7eac17b16c70be /README.md
parent7e1f2cb1a953c5360b896f70bb485929376fd143 (diff)
Small fixes and additions (#22)
Diffstat (limited to 'README.md')
-rw-r--r--README.md14
1 files changed, 8 insertions, 6 deletions
diff --git a/README.md b/README.md
index 6e8d8a2..61fb305 100644
--- a/README.md
+++ b/README.md
@@ -499,8 +499,6 @@ Marek Majkowski](https://blog.cloudflare.com/a-gentle-introduction-to-linux-kern
499 499
500[2019: "Hourglass Fuzz: A Quick Bug Hunting Method"](https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Hourglass%20Fuzz%20-%20A%20Quick%20Bug%20Hunting%20Method%20-%20Moony%20Li,%20Todd%20Han,%20Lance%20Jiang%20&%20Lilang%20Wu.pdf) [slides] 500[2019: "Hourglass Fuzz: A Quick Bug Hunting Method"](https://conference.hitb.org/hitbsecconf2019ams/materials/D1T2%20-%20Hourglass%20Fuzz%20-%20A%20Quick%20Bug%20Hunting%20Method%20-%20Moony%20Li,%20Todd%20Han,%20Lance%20Jiang%20&%20Lilang%20Wu.pdf) [slides]
501 501
502[2019: "Fuzzing File Systems via Two-Dimensional Input Space Exploration"](https://taesoo.kim/pubs/2019/xu:janus.pdf) [paper]
503
504[2018: "RAZZER: Finding Kernel Race Bugs through Fuzzing"](https://lifeasageek.github.io/papers/jeong:razzer.pdf) [paper] 502[2018: "RAZZER: Finding Kernel Race Bugs through Fuzzing"](https://lifeasageek.github.io/papers/jeong:razzer.pdf) [paper]
505 503
506[2018: "FastSyzkaller: Improving Fuzz Efficiency for Linux Kernel Fuzzing"](https://iopscience.iop.org/article/10.1088/1742-6596/1176/2/022013/pdf) [paper] 504[2018: "FastSyzkaller: Improving Fuzz Efficiency for Linux Kernel Fuzzing"](https://iopscience.iop.org/article/10.1088/1742-6596/1176/2/022013/pdf) [paper]
@@ -580,10 +578,12 @@ https://github.com/schumilo/vUSBf
580 578
581https://github.com/ucsb-seclab/difuze 579https://github.com/ucsb-seclab/difuze
582 580
583https://github.com/compsec-snu/razzer 581https://github.com/compsec-snu/razzer (race vulnerability detection)
584 582
585https://github.com/fgsect/unicorefuzz 583https://github.com/fgsect/unicorefuzz
586 584
585https://github.com/shankarapailoor/moonshine (seed input distill)
586
587 587
588## Exploits 588## Exploits
589 589
@@ -593,9 +593,9 @@ https://github.com/offensive-security/exploit-database/tree/master/platforms/lin
593 593
594https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux+kernel&colspec=ID+Type+Status+Priority+Milestone+Owner+Summary&cells=ids 594https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=linux+kernel&colspec=ID+Type+Status+Priority+Milestone+Owner+Summary&cells=ids
595 595
596http://vulnfactory.org/exploits/ 596http://vulnfactory.org/exploits/ (year 2010 and 2011)
597 597
598https://www.kernel-exploits.com/ 598https://www.kernel-exploits.com/ (can not open)
599 599
600https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs 600https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
601 601
@@ -629,7 +629,9 @@ https://github.com/brl/grlh
629 629
630https://github.com/externalist/exploit_playground 630https://github.com/externalist/exploit_playground
631 631
632https://github.com/ww9210/Linux_kernel_exploits 632https://github.com/ww9210/Linux_kernel_exploits (FUZE)
633
634https://github.com/ww9210/kepler-cfhp (KEPLER)
633 635
634https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack 636https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack
635 637