Broken-Assumptions / EDEFuzzLinks
☆25Updated 9 months ago
Alternatives and similar repositories for EDEFuzz
Users that are interested in EDEFuzz are comparing it to the libraries listed below
Sorting:
- Witcher is the first framework for using AFL to fuzz web applications.☆104Updated 2 years ago
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆43Updated 2 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆98Updated 2 years ago
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆47Updated 2 years ago
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆75Updated last year
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆99Updated 9 months ago
- ☆18Updated last year
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Updated last year
- CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph☆135Updated last year
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Updated 2 years ago
- AFL/AFL++ version FishFuzz☆98Updated 11 months ago
- A GPT-Based Fuzz Driver Generator☆49Updated 2 years ago
- A browser fuzzer augmented by API mod-ref relations☆35Updated last year
- a blackbox network fuzzer for IoT devices☆56Updated last year
- Automatic Exploit Generation Paper☆89Updated 4 years ago
- a browser fuzzer☆46Updated last year
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Updated 2 years ago
- Artifact for ICSE 2023☆50Updated 3 years ago
- ☆80Updated 3 years ago
- An automated ROP generation work☆12Updated 11 months ago
- Coverage-guided Fuzzing as Online Stochastic Control☆58Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Updated 6 months ago
- ☆134Updated last year
- A set of Code-ql/Joern queries to find vulnerabilities☆67Updated 4 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆80Updated 3 months ago
- ☆14Updated 6 years ago
- ☆67Updated 4 years ago
- ☆61Updated 2 years ago
- Parsing-based Analyzer☆70Updated 8 months ago
- ☆11Updated 2 years ago