SkyLined / BugId
Detect, analyze and uniquely identify crashes in Windows applications
☆503Updated last month
Alternatives and similar repositories for BugId:
Users that are interested in BugId are comparing it to the libraries listed below
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆339Updated 4 years ago
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆643Updated 2 weeks ago
- A distributed fuzzing testing suite with web administration☆374Updated 6 years ago
- Generation-based, context-free grammar fuzzer. Refer to https://github.com/posidron/dharma for a maintained version.☆489Updated 3 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- Bucket and triage on-disk crashes. OSX and Linux.☆357Updated 5 months ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆343Updated 5 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆604Updated last year
- ☆247Updated 4 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆384Updated last year
- Checksec, but for Windows: static detection of security mitigations in executables☆582Updated 3 months ago
- ☆607Updated 2 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆746Updated 2 years ago
- Linux Heap Exploitation Practice☆381Updated 6 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆415Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆579Updated 6 years ago
- Using Intel's PIN tool to solve CTF problems☆498Updated 5 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆334Updated 5 years ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆511Updated 3 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆302Updated 6 years ago
- A Binary Ninja plugin for vulnerability research.☆290Updated 7 months ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆405Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆198Updated 4 years ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆398Updated 2 years ago
- Release Branches for MoFlow☆304Updated 9 years ago
- ☆380Updated 5 years ago
- AFL/QEMU fuzzing with full-system emulation.☆628Updated 6 years ago
- ☆663Updated 2 weeks ago
- Project Zero Docs and Tools☆743Updated last week