choller / afl
Mozilla fork of the American Fuzzy Lop repo
☆46Updated 6 years ago
Alternatives and similar repositories for afl:
Users that are interested in afl are comparing it to the libraries listed below
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆81Updated 8 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Updated 8 years ago
- Patches to afl to fix bugs or add enhancements☆80Updated 5 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- ☆48Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- run AFL with pintool☆66Updated 5 years ago
- ☆49Updated 4 years ago
- Recover mutation graph from an AFL seed☆60Updated 4 years ago
- A pip wrapper around AFL.☆85Updated 4 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 3 years ago
- Utilities for generating dynamic traces☆91Updated last month
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆100Updated 5 years ago
- ☆63Updated 9 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- ☆63Updated 6 years ago
- covFuzz☆34Updated 7 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆171Updated 10 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 8 years ago
- A generated corpus, seed, and target for a fuzz job☆59Updated 9 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Seeding fuzzers with symbolic execution☆200Updated 7 years ago