DARPA Cyber Grand Challenge Documentation
☆117Feb 1, 2017Updated 9 years ago
Alternatives and similar repositories for cgc-release-documentation
Users that are interested in cgc-release-documentation are comparing it to the libraries listed below
Sorting:
- DARPA Cyber Grand Challenge OS syscall library☆18Feb 1, 2017Updated 9 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- Repository in which the CGC team will post technical answers during the scored events and qualification event.☆17Aug 7, 2016Updated 9 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆328Jun 6, 2018Updated 7 years ago
- DARPA Cyber Grand Challenge Linux source code☆17Jul 9, 2015Updated 10 years ago
- DARPA Cyber Grand Challenge Challenge Binary Testing tools☆30Jan 24, 2018Updated 8 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- CFE virtual competition framework☆14Feb 1, 2017Updated 9 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- ☆44Jun 17, 2020Updated 5 years ago
- Documentation for the Mechanical Phish.☆235Aug 21, 2016Updated 9 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- GNU Binutils ported to support DARPA Cyber Grand Challenge☆74Feb 1, 2017Updated 9 years ago
- Driller: augmenting AFL with symbolic execution!☆965Mar 24, 2025Updated 11 months ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- Fuzzing Browsers☆316Dec 5, 2022Updated 3 years ago
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- ☆17May 13, 2019Updated 6 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆189May 21, 2021Updated 4 years ago
- Nsolv - A front-end that allows multiple SMTLIBv2 compliant solvers to executed in parallel.☆11Dec 7, 2012Updated 13 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆655Jan 12, 2026Updated last month
- Documentation for the angr suite☆848Apr 27, 2023Updated 2 years ago
- A bibliography of papers related to symbolic execution☆291Aug 12, 2016Updated 9 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- ☆11May 19, 2017Updated 8 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- ☆15Jan 24, 2021Updated 5 years ago
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- A generated corpus, seed, and target for a fuzz job☆60Mar 13, 2016Updated 9 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago