AFLplusplus / Grammar-MutatorLinks
A grammar-based custom mutator for AFL++
☆257Updated last year
Alternatives and similar repositories for Grammar-Mutator
Users that are interested in Grammar-Mutator are comparing it to the libraries listed below
Sorting:
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆156Updated 2 years ago
- GraphFuzz is an experimental framework for building structure-aware, library API fuzzers.☆267Updated last year
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆179Updated last year
- ☆195Updated last year
- ☆305Updated 4 years ago
- Produce code coverage results with gcov from afl-fuzz test cases☆89Updated 8 months ago
- A LLVM Sanitizer for Symbolic Tracing☆223Updated last month
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆172Updated 2 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆355Updated 3 months ago
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆214Updated 4 years ago
- Kernel fuzzer inspired by Syzkaller.☆280Updated 3 years ago
- Learn how to combine libprotobuf-mutator with libfuzzer & AFL++☆256Updated 11 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆203Updated 3 years ago
- ☆230Updated last year
- ☆104Updated last year
- UT based automated fuzz driver generation☆169Updated 4 months ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆232Updated 3 years ago
- ☆190Updated 2 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆188Updated last year
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆263Updated 6 months ago
- Linux Kernel Fuzzer Corpus☆145Updated this week
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆90Updated 3 years ago
- ☆256Updated 2 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆348Updated last year
- A ground-truth fuzzing benchmark suite based on real programs with real bugs.☆319Updated 3 months ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆138Updated last year
- Fuzzing JavaScript Engines with Aspect-preserving Mutation☆227Updated last year
- Source code of ASAN--☆96Updated last year
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆156Updated 4 years ago