HexHive / IgorLinks
☆72Updated 2 years ago
Alternatives and similar repositories for Igor
Users that are interested in Igor are comparing it to the libraries listed below
Sorting:
- ☆57Updated last year
- 20 benchmark programs☆47Updated 4 years ago
- EcoFuzz-An adaptive energy-saving greybox fuzzer☆51Updated 5 years ago
- ☆68Updated 11 months ago
- ☆34Updated 4 years ago
- ☆50Updated 4 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆44Updated 5 years ago
- ☆46Updated 3 years ago
- ☆27Updated 2 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- Source code release for the KRace project☆28Updated 3 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆118Updated 2 years ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last year
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆79Updated 2 weeks ago
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- ☆90Updated 3 years ago
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆29Updated 6 years ago
- source code for savior fuzzer☆127Updated 4 years ago
- ☆55Updated last year
- ☆24Updated 2 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆28Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆94Updated last year
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- ☆36Updated last year