CIFASIS / neural-fuzzerLinks
☆90Updated 9 years ago
Alternatives and similar repositories for neural-fuzzer
Users that are interested in neural-fuzzer are comparing it to the libraries listed below
Sorting:
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆119Updated 8 years ago
- Distributed Fuzzing for afl☆72Updated 9 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆171Updated 10 years ago
- ☆85Updated 5 years ago
- Differential fuzzing for the masses!☆153Updated 8 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- A pip wrapper around AFL.☆86Updated 4 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Updated 9 years ago
- afl-fuzz for javascript☆203Updated 8 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Updated 8 years ago
- Seeding fuzzers with symbolic execution☆201Updated 8 years ago
- Mozilla fork of the American Fuzzy Lop repo☆47Updated 6 years ago
- Python concolic execution framework for program analysis☆67Updated 10 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- A linux system call fuzzer using TriforceAFL☆176Updated last year
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆188Updated 4 years ago
- ☆63Updated 9 years ago
- ☆237Updated 7 years ago
- Fuzzinator Random Testing Framework☆193Updated last month
- AFL, with scripts to support other architectures.☆97Updated 6 years ago
- ☆84Updated 7 years ago
- DARPA Cyber Grand Challenge Documentation☆117Updated 8 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Updated 7 years ago
- ☆49Updated 8 years ago
- Dynamic security analysis of embedded systems’ firmwares☆82Updated 9 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago
- Wadi Fuzzing Harness☆127Updated 8 years ago
- Path based Dynamic Analysis☆117Updated 8 years ago