avatartwo / ndss18_wycinwyc
☆64Updated 4 years ago
Alternatives and similar repositories for ndss18_wycinwyc:
Users that are interested in ndss18_wycinwyc are comparing it to the libraries listed below
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- ☆50Updated last year
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆100Updated 5 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆124Updated 2 years ago
- Utilities for generating dynamic traces☆91Updated 3 weeks ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆137Updated 3 years ago
- ☆64Updated 6 years ago
- ☆82Updated 6 years ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆81Updated 8 years ago
- Source code of HAL-fuzz☆147Updated 4 years ago
- ☆55Updated 5 years ago
- ☆53Updated 5 years ago
- source code for savior fuzzer☆127Updated 4 years ago
- ☆32Updated 2 years ago
- Inferred Model-based Fuzzer☆111Updated 3 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆120Updated 8 years ago
- Source-binary patch presence test system.☆83Updated 2 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆162Updated 3 years ago
- ☆90Updated 3 years ago
- Repository for monolithic firmware blobs☆74Updated 3 years ago
- ☆96Updated 6 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆154Updated 2 years ago
- Compiled CGC binaries for experimentation porpoises.☆21Updated 7 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆135Updated last year