ChrisMcMStone / state-inspectorLinks
Code from CCS paper: The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning
☆11Updated 2 years ago
Alternatives and similar repositories for state-inspector
Users that are interested in state-inspector are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- ☆93Updated last year
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆166Updated 2 years ago
- Protocol state machine learner and fuzzer for DTLS servers and clients☆37Updated last week
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆45Updated last year
- ☆68Updated 11 months ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆94Updated last year
- ProFuzzBench - A Benchmark for Stateful Protocol Fuzzing☆237Updated 9 months ago
- ☆25Updated 2 years ago
- ☆29Updated 2 years ago
- ICSE'22 - Havoc-MAB: Enhancing AFL havoc mutation with Two-layer Multi-Armed Bandit☆12Updated 2 years ago
- ☆88Updated 2 months ago
- ☆26Updated 2 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆28Updated 2 years ago
- ☆34Updated 4 months ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- a blackbox network fuzzer for IoT devices☆53Updated 9 months ago
- 20 benchmark programs☆47Updated 4 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- ☆50Updated 4 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆118Updated 2 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆34Updated last year
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆95Updated last year
- ☆56Updated last year
- FirmSec Dataset☆34Updated 2 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆70Updated 10 months ago
- ☆72Updated 2 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- ☆34Updated 4 years ago