NSSL-SJTU / SFuzzLinks
☆88Updated 2 months ago
Alternatives and similar repositories for SFuzz
Users that are interested in SFuzz are comparing it to the libraries listed below
Sorting:
- ☆56Updated last year
- ☆29Updated 2 years ago
- ☆32Updated 3 weeks ago
- ☆34Updated 2 years ago
- Perry: automated peripheral modeling with symbolic execution☆27Updated last year
- ☆68Updated 11 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆28Updated 2 years ago
- a blackbox network fuzzer for IoT devices☆53Updated 8 months ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆94Updated last year
- ☆26Updated last year
- ☆71Updated last month
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- ☆35Updated last year
- FirmSec Dataset☆34Updated 2 years ago
- ☆23Updated 8 months ago
- ☆93Updated last year
- ☆13Updated last year
- angr's exploration technique to perform taint analysis☆62Updated 5 years ago
- ☆44Updated 3 weeks ago
- 20 benchmark programs☆47Updated 4 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆118Updated 2 years ago
- ☆24Updated 3 years ago
- Repository for monolithic firmware blobs☆78Updated 3 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 6 months ago
- ☆57Updated last year
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆139Updated last year
- Automatic Exploit Generation Paper☆88Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆82Updated 3 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year