☆25Apr 14, 2025Updated 10 months ago
Alternatives and similar repositories for EDEFuzz
Users that are interested in EDEFuzz are comparing it to the libraries listed below
Sorting:
- ☆14Feb 4, 2020Updated 6 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 7 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆43Mar 15, 2023Updated 2 years ago
- ☆21Apr 30, 2021Updated 4 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆104Nov 28, 2023Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- ☆35Feb 4, 2026Updated last month
- ☆29Jul 4, 2018Updated 7 years ago
- AutoSpear☆72Jan 5, 2024Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 4 months ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- IDA Hexrays To Joern☆44Nov 7, 2024Updated last year
- ☆39Sep 27, 2022Updated 3 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- LLM-powered tool that enhances OpenAPI specifications by extracting machine-readable constraints from human-readable descriptions.☆14Nov 6, 2024Updated last year
- ☆49Jun 12, 2025Updated 8 months ago
- ☆17Jan 1, 2021Updated 5 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- a browser fuzzer☆47Mar 15, 2024Updated last year
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆52Jan 29, 2026Updated last month
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- ☆10Nov 9, 2023Updated 2 years ago
- It is a RESTful API fuzzer.☆12Jun 20, 2024Updated last year
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Tool for algorithmic complexity analysis based on symbolic execution☆10Sep 17, 2018Updated 7 years ago
- Cowic is a C++ library to compress formatted log like Apache access log.☆11May 3, 2015Updated 10 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- HTTP testing platform for security researchers☆20Updated this week
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆12Jan 26, 2025Updated last year
- A collection of awesome web crawler,spider in different languages☆12Oct 6, 2017Updated 8 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago