☆78Dec 26, 2025Updated 2 months ago
Alternatives and similar repositories for Igor
Users that are interested in Igor are comparing it to the libraries listed below
Sorting:
- ☆58Jul 21, 2023Updated 2 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆161Aug 31, 2022Updated 3 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆94Jan 19, 2022Updated 4 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- A regression greybox fuzzer aflchurn☆67May 19, 2022Updated 3 years ago
- Recover mutation graph from an AFL seed☆60Jan 6, 2021Updated 5 years ago
- Something about AEG☆272May 29, 2019Updated 6 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- A ground-truth fuzzing benchmark suite based on real programs with real bugs.☆335Jan 11, 2026Updated 2 months ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- ☆18Dec 16, 2024Updated last year
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- ☆91Oct 25, 2021Updated 4 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- A curated list of awesome directed fuzzing research papers☆585Dec 27, 2025Updated 2 months ago
- A data-flow-guided fuzzer☆124Aug 19, 2023Updated 2 years ago
- ☆55Mar 30, 2020Updated 5 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- ☆307Aug 13, 2021Updated 4 years ago
- ☆81Sep 7, 2023Updated 2 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆125Mar 31, 2021Updated 4 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Nov 4, 2022Updated 3 years ago
- EcoFuzz-An adaptive energy-saving greybox fuzzer☆54Apr 30, 2020Updated 5 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- ☆25Oct 4, 2018Updated 7 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Jul 14, 2022Updated 3 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆121Apr 4, 2023Updated 2 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- CollabFuzz: A Framework for Collaborative Fuzzing☆70Dec 2, 2021Updated 4 years ago
- ☆73Jun 26, 2024Updated last year
- Grey-box Concolic Testing on Binary Code (ICSE '19)☆156Oct 4, 2021Updated 4 years ago
- A collection of widely-fuzzed targets☆46Aug 4, 2019Updated 6 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆187Nov 29, 2023Updated 2 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆270Feb 21, 2025Updated last year