From a9301f27bb4bd79075cc5f5b8c9bb8c403bbcf1f Mon Sep 17 00:00:00 2001 From: za Date: Fri, 22 Aug 2025 13:31:29 +0700 Subject: [PATCH] Added more resources on CodeQL https://github.com/trailofbits/testing-handbook/issues/8 --- content/docs/static-analysis/codeql/99-resources.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/content/docs/static-analysis/codeql/99-resources.md b/content/docs/static-analysis/codeql/99-resources.md index 7a9b532..b12c7dd 100644 --- a/content/docs/static-analysis/codeql/99-resources.md +++ b/content/docs/static-analysis/codeql/99-resources.md @@ -35,6 +35,8 @@ weight: 99 - [Clang checkers and CodeQL queries for detecting untrusted pointer derefs and tainted loop conditions](https://www.zerodayinitiative.com/blog/2022/2/22/clang-checkers-and-codeql-queries-for-detecting-untrusted-pointer-derefs-and-tainted-loop-conditions) - [Vulnerability digging with CodeQL](https://mogwailabs.de/en/blog/2021/09/vulnerability-digging-with-codeql/) - [Make memcpy safe again: CodeQL](https://web.archive.org/web/20231203081719/https://www.cyberark.com/resources/threat-research-blog/make-memcpy-safe-again-codeql) +- [Heap exploitation](https://github.com/google/security-research/blob/master/analysis/kernel/heap-exploitation/README.md) +- [Interesting kernel objects](https://lookerstudio.google.com/reporting/68b02863-4f5c-4d85-b3c1-992af89c855c/page/n92nD) ### CodeQL in CI/CD