DARPA Cyber Grand Challenge Sample Challenges
☆331Jun 6, 2018Updated 7 years ago
Alternatives and similar repositories for samples
Users that are interested in samples are comparing it to the libraries listed below
Sorting:
- DARPA Cyber Grand Challenge Documentation☆118Feb 1, 2017Updated 9 years ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆536Jun 29, 2023Updated 2 years ago
- Driller: augmenting AFL with symbolic execution!☆964Mar 24, 2025Updated 11 months ago
- DARPA Cyber Grand Challenge Linux source code☆18Jul 9, 2015Updated 10 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- Infrastructure for Reassembleable Disassembling and Transformation☆214Feb 22, 2026Updated 3 weeks ago
- DARPA Cyber Grand Challenge Challenge Binary Testing tools☆31Jan 24, 2018Updated 8 years ago
- Repository in which the CGC team will post technical answers during the scored events and qualification event.☆17Aug 7, 2016Updated 9 years ago
- AFLFast (extends AFL with Power Schedules)☆422Jun 16, 2023Updated 2 years ago
- Documentation for the angr suite☆848Apr 27, 2023Updated 2 years ago
- ☆387Oct 28, 2019Updated 6 years ago
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 11 months ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- DARPA Cyber Grand Challenge OS syscall library☆19Feb 1, 2017Updated 9 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆656Jan 12, 2026Updated 2 months ago
- ☆99Oct 19, 2020Updated 5 years ago
- neural network assisted fuzzer☆413May 24, 2020Updated 5 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆180Mar 29, 2022Updated 3 years ago
- Compiled CGC binaries for experimentation porpoises.☆22Jul 6, 2017Updated 8 years ago
- Set of tests for fuzzing engines☆1,468Aug 25, 2021Updated 4 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- ☆72Apr 5, 2017Updated 8 years ago
- LAVA: Large-scale Automated Vulnerability Addition☆409Feb 1, 2026Updated last month
- Binary Analysis Platform☆2,217Apr 30, 2025Updated 10 months ago
- A survey by the SEASON lab on symbolic execution tools and techniques. The survey has appeared in ACM CSUR in 2018.☆84May 3, 2018Updated 7 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆105Mar 25, 2021Updated 4 years ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,313Jan 6, 2026Updated 2 months ago
- A powerful and user-friendly binary analysis platform!☆8,546Mar 14, 2026Updated last week
- AFL/QEMU fuzzing with full-system emulation.☆641Sep 9, 2018Updated 7 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆161Aug 31, 2022Updated 3 years ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆59Apr 3, 2024Updated last year
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆955Jul 18, 2022Updated 3 years ago
- ☆252Mar 13, 2020Updated 6 years ago
- User Guided API Misuse Detection☆30Dec 9, 2022Updated 3 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,617Jun 11, 2025Updated 9 months ago