Something about AEG
☆270May 29, 2019Updated 6 years ago
Alternatives and similar repositories for Automatic-Exploit-Generation
Users that are interested in Automatic-Exploit-Generation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatic Exploit Generation Paper☆87Dec 12, 2021Updated 4 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,144Sep 10, 2023Updated 2 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57May 4, 2019Updated 6 years ago
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆562Dec 11, 2023Updated 2 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- There are some papers about fuzzing. I record them by Xmind. Welcome to contact to me.☆275Oct 28, 2019Updated 6 years ago
- Recent Fuzzing Paper☆2,749Mar 19, 2026Updated last month
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆102Nov 24, 2019Updated 6 years ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆350Jul 30, 2024Updated last year
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- ☆78Dec 26, 2025Updated 4 months ago
- fuzzing + concolic = fuzzolic :)☆130Nov 6, 2025Updated 5 months ago
- my automatic exploit generation (DEPRECATED)☆59Jun 21, 2016Updated 9 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90May 7, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- I am still working on it☆11Apr 30, 2020Updated 5 years ago
- ☆228Dec 9, 2020Updated 5 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆157Mar 3, 2021Updated 5 years ago
- 一些阅读源码和Fuzzing 的经验,涵盖黑盒与白盒测试..☆1,078Aug 24, 2021Updated 4 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆104Jan 13, 2023Updated 3 years ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆502Sep 7, 2018Updated 7 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆459Mar 22, 2024Updated 2 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆763Jan 27, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Sep 4, 2019Updated 6 years ago
- ☆238Jan 14, 2024Updated 2 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆652Jan 12, 2026Updated 3 months ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,672Jun 17, 2024Updated last year
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆141Aug 17, 2021Updated 4 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆374May 5, 2025Updated 11 months ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆161Aug 31, 2022Updated 3 years ago
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆58Jul 21, 2023Updated 2 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆426Sep 18, 2021Updated 4 years ago
- Learn how to combine libprotobuf-mutator with libfuzzer & AFL++☆258Sep 24, 2024Updated last year
- ☆308Aug 13, 2021Updated 4 years ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,354Feb 21, 2025Updated last year
- A LLVM Sanitizer for Symbolic Tracing☆237Apr 15, 2026Updated 2 weeks ago
- A curated list of awesome directed fuzzing research papers☆587Apr 21, 2026Updated last week