DARPA Cyber Grand Challenge Sample Challenges
☆328Jun 6, 2018Updated 7 years ago
Alternatives and similar repositories for samples
Users that are interested in samples are comparing it to the libraries listed below
Sorting:
- DARPA Cyber Grand Challenge Documentation☆117Feb 1, 2017Updated 9 years ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆536Jun 29, 2023Updated 2 years ago
- Driller: augmenting AFL with symbolic execution!☆964Mar 24, 2025Updated 11 months ago
- DARPA Cyber Grand Challenge Linux source code☆17Jul 9, 2015Updated 10 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- Infrastructure for Reassembleable Disassembling and Transformation☆213Updated this week
- AFLFast (extends AFL with Power Schedules)☆422Jun 16, 2023Updated 2 years ago
- ☆386Oct 28, 2019Updated 6 years ago
- Documentation for the angr suite☆848Apr 27, 2023Updated 2 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆654Jan 12, 2026Updated last month
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 11 months ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- neural network assisted fuzzer☆413May 24, 2020Updated 5 years ago
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- Set of tests for fuzzing engines☆1,467Aug 25, 2021Updated 4 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- Binary Analysis Platform☆2,211Apr 30, 2025Updated 10 months ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆179Mar 29, 2022Updated 3 years ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,310Jan 6, 2026Updated last month
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- ☆72Apr 5, 2017Updated 8 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Mar 25, 2021Updated 4 years ago
- ☆809Feb 5, 2026Updated 3 weeks ago
- LAVA: Large-scale Automated Vulnerability Addition☆409Feb 1, 2026Updated 3 weeks ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,612Jun 11, 2025Updated 8 months ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆418Jun 6, 2018Updated 7 years ago
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆954Jul 18, 2022Updated 3 years ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- A powerful and user-friendly binary analysis platform!☆8,507Feb 20, 2026Updated last week
- A pip wrapper around AFL.☆87Apr 12, 2021Updated 4 years ago
- ☆99Oct 19, 2020Updated 5 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆162Aug 31, 2022Updated 3 years ago
- Symbolic execution tool☆3,838Feb 13, 2026Updated 2 weeks ago
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆177Apr 19, 2024Updated last year
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆608Jun 18, 2023Updated 2 years ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆59Apr 3, 2024Updated last year