MCUSec / microAFLLinks
☆47Updated 2 years ago
Alternatives and similar repositories for microAFL
Users that are interested in microAFL are comparing it to the libraries listed below
Sorting:
- ☆66Updated 8 months ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆63Updated last year
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆139Updated 3 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆124Updated 4 years ago
- Repository for monolithic firmware blobs☆80Updated 3 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆139Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆137Updated last year
- Automated IoT firmware fuzzing framework.☆80Updated 5 years ago
- Recent security papers on firmware analysis☆76Updated 3 years ago
- ☆162Updated 3 years ago
- μSBS: Static Binary Sanitization of Bare-metal Embedded Devices☆30Updated 3 years ago
- ☆18Updated 6 months ago
- Real firmware fuzz-tested in P2IM paper☆24Updated 4 years ago
- The published code repo for the Cortex-M SoK paper.☆19Updated 3 weeks ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆10Updated 6 months ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- ☆51Updated 3 weeks ago
- ☆55Updated last year
- ☆24Updated 10 months ago
- ☆72Updated 2 years ago
- ☆37Updated 3 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Updated last year
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆61Updated 7 months ago
- Source code of HAL-fuzz☆152Updated 4 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- ☆27Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- Perry: automated peripheral modeling with symbolic execution☆27Updated last year