AFLplusplus / LibAFL
Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
☆2,143Updated this week
Alternatives and similar repositories for LibAFL:
Users that are interested in LibAFL are comparing it to the libraries listed below
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆5,508Updated this week
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,141Updated this week
- cwe_checker finds vulnerable patterns in binary executables☆1,188Updated 2 months ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,154Updated this week
- A powerful static binary rewriting tool☆1,007Updated last month
- A lightweight dynamic instrumentation library☆1,210Updated 2 months ago
- Set of tests for fuzzing engines☆1,436Updated 3 years ago
- AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)☆904Updated 7 months ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,374Updated 7 months ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,271Updated last week
- A JavaScript Engine Fuzzer☆1,950Updated last month
- A fork of AFL for fuzzing Windows binaries☆2,394Updated 2 months ago
- FuzzBench - Fuzzer benchmarking as a service.☆1,126Updated 3 weeks ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,525Updated this week
- american fuzzy lop - a security-oriented fuzzer☆3,828Updated 3 years ago
- Binary Analysis Platform☆2,104Updated this week
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆939Updated 2 years ago
- SymCC: efficient compiler-based symbolic execution☆797Updated 7 months ago
- The official angr GUI.☆949Updated this week
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆543Updated last year
- Library for lifting machine code to LLVM bitcode☆1,355Updated 7 months ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆598Updated 2 months ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,245Updated 2 years ago
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,600Updated 4 months ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆698Updated 9 months ago
- Project page for "The Fuzzing Book"☆1,146Updated last month
- The 'exploitable' GDB plugin☆724Updated 2 years ago
- UNIX-like reverse engineering framework and command-line toolset.☆2,810Updated this week
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,383Updated 9 months ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,604Updated 8 months ago