SoftwareSecurityLab / Heap-Overflow-DetectionLinks
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
☆22Updated 3 years ago
Alternatives and similar repositories for Heap-Overflow-Detection
Users that are interested in Heap-Overflow-Detection are comparing it to the libraries listed below
Sorting:
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆30Updated last year
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆85Updated 3 weeks ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- A list of data-only attacks☆20Updated 3 months ago
- Target components for kAFL/Nyx Fuzzer☆35Updated 4 months ago
- ☆76Updated 3 years ago
- ☆44Updated 3 years ago
- AutoCorpus is a tool backed by a large language model (LLM) for automatically generating corpus files for fuzzing.☆72Updated last year
- Coverage-guided Fuzzing as Online Stochastic Control☆55Updated last year
- ☆61Updated 4 months ago
- NDSS 2020 - HYPER-CUBE: High-Dimensional Hypervisor Fuzzing☆65Updated 2 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆71Updated 2 years ago
- Symbolic Execution Over Processor Traces☆125Updated last year
- ☆20Updated 9 months ago
- kAFL Fuzzer☆34Updated 8 months ago
- A tool for effective testing the binding layer of scripting languages☆79Updated 3 years ago
- ☆26Updated last year
- a browser fuzzer☆44Updated last year
- Target components for kAFL/Nyx Fuzzer☆35Updated last year
- Code Property Graph (CPG) frontend for binary applications and libraries.☆94Updated 4 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Updated 3 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆66Updated 3 weeks ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆126Updated 11 months ago
- NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)☆109Updated 4 years ago
- ☆39Updated 3 years ago
- ☆46Updated 5 months ago
- ☆19Updated 6 months ago
- ☆14Updated 4 years ago
- Practical Data-Only Attack Generation☆43Updated last year