bshastry / afl-sancov
AFL coverage tool using Clang SanitizerCoverage
☆37Updated 8 years ago
Alternatives and similar repositories for afl-sancov:
Users that are interested in afl-sancov are comparing it to the libraries listed below
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- Test case minimizer for afl-fuzz☆26Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- run AFL with pintool☆65Updated 5 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago
- ☆63Updated 6 years ago
- ☆96Updated 6 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆92Updated 7 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- Utilities for generating dynamic traces☆91Updated last month
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 8 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- Patches to afl to fix bugs or add enhancements☆80Updated 5 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆100Updated 5 years ago
- The collection of programs for evaluating fuzzing techniques☆20Updated 7 years ago
- ☆36Updated last month
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆81Updated 8 years ago
- The parser-directed Fuzzer☆38Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆36Updated 5 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- ☆49Updated 4 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 9 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆98Updated 4 years ago