RICSecLab / AFLplusplus-csLinks
☆18Updated 3 years ago
Alternatives and similar repositories for AFLplusplus-cs
Users that are interested in AFLplusplus-cs are comparing it to the libraries listed below
Sorting:
- ☆14Updated 2 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- ☆13Updated 5 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 2 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- IDA (sort of) headless☆25Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- ☆34Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Updated 2 years ago
- ☆35Updated 4 years ago
- Load function names from an IDA Pro database inside GDB☆21Updated 6 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- PoC for House of Husk Exploit☆13Updated 5 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 5 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago