☆16Apr 15, 2019Updated 6 years ago
Alternatives and similar repositories for FuzzM
Users that are interested in FuzzM are comparing it to the libraries listed below
Sorting:
- Assume-Guarantee REasoning Environment☆20Dec 3, 2025Updated 3 months ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Mar 11, 2026Updated last week
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- A modular Lustre to C / Horn clauses compiler☆21Nov 17, 2018Updated 7 years ago
- CRash Scope (CRScope) is a ML-guided crash classifier of a given JavaScript engine crash-dump file.☆13Aug 28, 2019Updated 6 years ago
- ☆13May 5, 2018Updated 7 years ago
- Tools for manipulating CHC and related files☆15Apr 21, 2023Updated 2 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Feb 6, 2021Updated 5 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Public BanditFuzz Repo☆12Jan 12, 2021Updated 5 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- A model-based API Fuzzer for SMT Solvers.☆16Oct 14, 2025Updated 5 months ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- Tool to visualize and explain LTL counterexamples generated by the NuSMV model checker☆10Sep 7, 2020Updated 5 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- Dynamic Analysis for Concurrent Programs☆27Jan 31, 2026Updated last month
- A collection of useful TLA+ operators☆21Feb 15, 2018Updated 8 years ago
- ☆22Apr 17, 2023Updated 2 years ago
- Automated Analysis Framework for Simulink/Stateflow☆15Jul 25, 2023Updated 2 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Aug 11, 2023Updated 2 years ago
- Code from MSc thesis on combining learning and fuzzing☆19Jul 30, 2018Updated 7 years ago
- Examples demonstrating the usage of avatar²☆28Dec 9, 2023Updated 2 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- Run TLC in cmd☆15Jan 20, 2026Updated 2 months ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆18Oct 19, 2023Updated 2 years ago
- Map2Check: Finding Software Vulnerabilities☆30Nov 13, 2020Updated 5 years ago
- ☆19Jan 2, 2021Updated 5 years ago
- Synesthesia, implemented as Yices scripts☆94Jul 17, 2017Updated 8 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 4 years ago
- An index of archived code and papers. Open an issue to request an addition.☆23Jan 7, 2020Updated 6 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- A specification of the CBC Casper consensus protocols written in TLA+ and PlusCal (transpiled to TLA+)☆20Aug 12, 2019Updated 6 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Oct 19, 2017Updated 8 years ago