CyberGrandChallenge / cgc-release-documentationLinks
DARPA Cyber Grand Challenge Documentation
☆117Updated 8 years ago
Alternatives and similar repositories for cgc-release-documentation
Users that are interested in cgc-release-documentation are comparing it to the libraries listed below
Sorting:
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆119Updated 8 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- A pip wrapper around AFL.☆86Updated 4 years ago
- ☆90Updated 9 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆171Updated 10 years ago
- Distributed Fuzzing for afl☆72Updated 9 years ago
- ☆237Updated 7 years ago
- FuzzBALL: Vine-based Binary Symbolic Execution☆214Updated 2 months ago
- A linux system call fuzzer using TriforceAFL☆176Updated last year
- ☆159Updated 10 years ago
- Differential fuzzing for the masses!☆153Updated 8 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆188Updated 4 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 9 years ago
- SymGDB - symbolic execution plugin for gdb☆217Updated 7 years ago
- Dynamic security analysis of embedded systems’ firmwares☆82Updated 9 years ago
- Seeding fuzzers with symbolic execution☆201Updated 8 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Updated 7 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆325Updated 7 years ago
- AFL, with scripts to support other architectures.☆97Updated 6 years ago
- ☆85Updated 5 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Updated 8 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆242Updated 6 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆112Updated 9 years ago
- ☆63Updated 6 years ago
- ☆252Updated 5 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Function redirection via ELF tricks.☆161Updated 10 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Python concolic execution framework for program analysis☆67Updated 10 years ago