boschresearch / neuzzplusplus
☆17Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for neuzzplusplus
- ☆15Updated 11 months ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated 11 months ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆41Updated 2 years ago
- ☆33Updated 11 months ago
- The Use of Likely Invariants as Feedback for Fuzzers☆86Updated 2 years ago
- MTFuzz: Fuzzing with a Multi-Task Neural Network☆34Updated 3 years ago
- Source code of MEUZZ fuzzer☆43Updated 2 years ago
- A regression greybox fuzzer aflchurn☆64Updated 2 years ago
- For paper "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhuo Zhang, Nan …☆47Updated 2 weeks ago
- ☆25Updated last year
- SeamFuzz Artifact repository for ICSE 2023☆13Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆31Updated last month
- ☆54Updated 8 months ago
- ☆19Updated last year
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆45Updated 11 months ago
- Produce code coverage results with gcov from afl-fuzz test cases☆68Updated 4 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆71Updated 2 years ago
- ☆31Updated 3 years ago
- autofz: Automated Fuzzer Composition at Runtime☆76Updated last year
- A browser fuzzer augmented by API mod-ref relations☆31Updated 8 months ago
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated 5 months ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆20Updated 7 months ago
- ☆54Updated 6 months ago
- Symbolic Execution Over Processor Traces☆116Updated 2 months ago
- ☆46Updated 2 years ago
- 20 benchmark programs☆45Updated 3 years ago
- ☆38Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆84Updated 6 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year