chenyueqi / SLAKE
☆36Updated 4 years ago
Alternatives and similar repositories for SLAKE:
Users that are interested in SLAKE are comparing it to the libraries listed below
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- ☆51Updated 9 months ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated last year
- A collection of widely-fuzzed targets☆44Updated 5 years ago
- ☆46Updated 3 years ago
- ☆34Updated last year
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- UAF Fuzzing Benchmark☆57Updated 4 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆29Updated 6 years ago
- An Automated Heap Feng Shui Tool☆16Updated 2 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 5 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆101Updated 2 years ago
- Run fuzzing experiments in Docker☆29Updated 3 years ago
- ☆76Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 9 months ago
- ☆25Updated 2 years ago
- MS-Fuzz data☆15Updated 2 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- A regression greybox fuzzer aflchurn☆65Updated 2 years ago
- ☆31Updated last year
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆64Updated 3 years ago
- Syzkaller with MAB scheduling and seed selection☆24Updated 5 years ago
- ☆64Updated 5 years ago
- ☆24Updated last year
- ☆25Updated last year
- ☆66Updated 5 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆31Updated 9 months ago
- AFLTeam Collaborative Parallel Fuzzing☆73Updated 2 years ago
- angr's exploration technique to perform taint analysis☆55Updated 4 years ago