AFLplusplus / LibAFL-legacyLinks
AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!
☆113Updated 4 years ago
Alternatives and similar repositories for LibAFL-legacy
Users that are interested in LibAFL-legacy are comparing it to the libraries listed below
Sorting:
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆208Updated 3 years ago
- ☆96Updated 6 years ago
- ☆131Updated 5 years ago
- The new phuzzing framework!☆159Updated last year
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆75Updated 4 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆216Updated 8 months ago
- Utilities for generating dynamic traces☆92Updated 2 months ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆301Updated 2 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- ☆198Updated 2 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆63Updated 6 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- ☆98Updated 4 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- fuzzing + concolic = fuzzolic :)☆121Updated 3 weeks ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆178Updated last year
- Challenging testcases for fuzzers☆71Updated last year
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Updated 3 years ago
- Improving AFL by using Intel PT to collect branch information☆292Updated 5 years ago