a4865g / Cheng-fuzzLinks
Fuzzing with the generated argument and environment variable
☆10Updated 3 years ago
Alternatives and similar repositories for Cheng-fuzz
Users that are interested in Cheng-fuzz are comparing it to the libraries listed below
Sorting:
- Fuzzing with the generated argument☆33Updated 2 years ago
- ☆18Updated 4 years ago
- Saryn: Fuzzing with Taint Inference☆16Updated 3 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Updated 2 years ago
- LN-fuzz: State Sequence Network Protocol Fuzzer☆11Updated 4 years ago
- ☆11Updated 5 years ago
- QilingLab challenge writeup☆21Updated 4 years ago
- Hsuan-Fuzz: REST API Fuzzing by Coverage Level Guided Blackbox Testing☆29Updated 3 years ago
- Use k-means improve seed selection.☆13Updated 4 years ago
- a browser fuzzer☆40Updated last year
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆30Updated 2 years ago
- ☆19Updated 2 years ago
- A browser fuzzer augmented by API mod-ref relations☆33Updated last year
- Fuzzing tutorial with easy-to-learn labs 🚀☆160Updated 3 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆92Updated 3 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆54Updated 11 months ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆89Updated 3 years ago
- ☆77Updated 2 years ago
- ☆69Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated 2 years ago
- AFL/AFL++ version FishFuzz☆91Updated 6 months ago
- Companion repository to the Fuzzing101 with LibAFL series of blog posts.☆157Updated 7 months ago
- Automatic Exploit Generation Paper☆90Updated 3 years ago
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- Run fuzzing experiments in Docker☆32Updated 4 years ago
- ☆36Updated last year
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆15Updated 3 years ago
- ☆30Updated 2 years ago
- ☆80Updated 2 years ago
- Material and examples for a presentation on static binary analysis.☆45Updated 4 years ago