BanditFuzz / BanditFuzz_PublicLinks
Public BanditFuzz Repo
☆12Updated 4 years ago
Alternatives and similar repositories for BanditFuzz_Public
Users that are interested in BanditFuzz_Public are comparing it to the libraries listed below
Sorting:
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Updated 3 years ago
- Sys, but no longer in Haskell☆18Updated 3 years ago
- An approximate solver for concolic execution☆18Updated 4 months ago
- KLEE / CSE Project☆46Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- ☆25Updated 4 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆21Updated 2 years ago
- Map2Check: Finding Software Vulnerabilities☆30Updated 4 years ago
- Fuzzing with controlled compilation☆30Updated 2 years ago
- ☆33Updated 6 years ago
- Experimental translation of llvm to smt.☆57Updated 5 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- Implementation of the IC3 / Property Directed Reachability algorithm using the the Z3 SMT solver.☆16Updated 9 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- Grey-box fuzzer SIVO☆14Updated 4 years ago
- Evolving fuzzers with large language models☆17Updated last year
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- [ICSE2020] UAFL DataSet☆11Updated 2 years ago
- This repository contains several examples of logic bomb.☆112Updated last year
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- ☆40Updated 6 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) progra…☆51Updated 3 months ago
- Concolic analysis tool for Java☆21Updated 2 years ago
- Exports an LLVM control flow graph (CFG) (including function calls) to JSON☆24Updated 3 years ago
- TracerX Symbolic Virtual Machine☆33Updated this week
- ☆12Updated 4 years ago
- ☆10Updated 5 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Updated 5 years ago
- Scalable Validator for Binary Lifters☆57Updated 5 years ago