Skip to content

Mock up of UAF analysis through symbolic execution.

Notifications You must be signed in to change notification settings

JordyZomer/UAFinator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 

Repository files navigation

UAFinator

Mock up of UAF analysis through symbolic execution.

By hooking on every free we can get the address from the rdi register. When keeping track of those we have a callback on every memory (read|write) that checks if this region has been freed before.

-- Happy Hacking

Todo

  • Check if the memory has been allocated again with a hook to allocation functions
  • Universal UAF detection
  • Check for double frees too (WIP)
  • Combat path exploration and path explosion
  • Generate testcases

About

Mock up of UAF analysis through symbolic execution.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages