☆16Apr 15, 2019Updated 7 years ago
Alternatives and similar repositories for FuzzM
Users that are interested in FuzzM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Assume-Guarantee REasoning Environment☆22Dec 3, 2025Updated 4 months ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Apr 22, 2026Updated last week
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12May 31, 2018Updated 7 years ago
- Fuzz testing for Dafny☆13Jul 7, 2022Updated 3 years ago
- CRash Scope (CRScope) is a ML-guided crash classifier of a given JavaScript engine crash-dump file.☆13Aug 28, 2019Updated 6 years ago
- ☆13May 5, 2018Updated 7 years ago
- Tools for manipulating CHC and related files☆15Apr 21, 2023Updated 3 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Feb 6, 2021Updated 5 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- EagleRepair fixes static analysis warnings in C# programs. Easy to use. Blazing fast. Based on research.☆12Feb 27, 2023Updated 3 years ago
- A model-based API Fuzzer for SMT Solvers.☆16Oct 14, 2025Updated 6 months ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 7 years ago
- Tool to visualize and explain LTL counterexamples generated by the NuSMV model checker☆10Sep 7, 2020Updated 5 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- Dynamic Analysis for Concurrent Programs☆31Updated this week
- A collection of useful TLA+ operators☆21Feb 15, 2018Updated 8 years ago
- ☆22Apr 17, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆22Sep 28, 2022Updated 3 years ago
- radare2 cLEMENCy plugins☆24Nov 5, 2017Updated 8 years ago
- Automated Analysis Framework for Simulink/Stateflow☆15Jul 25, 2023Updated 2 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Aug 11, 2023Updated 2 years ago
- Code from MSc thesis on combining learning and fuzzing☆19Jul 30, 2018Updated 7 years ago
- JKind - An infinite-state model checker for safety properties in Lustre☆55Jul 3, 2025Updated 9 months ago
- Examples demonstrating the usage of avatar²☆28Dec 9, 2023Updated 2 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- Run TLC in cmd☆15Jan 20, 2026Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 快捷指令集☆13Apr 19, 2021Updated 5 years ago
- A Tool-Chain for Quantitative Evaluation of Uncertainty-Aware Hybrid AADL Designs☆11Apr 28, 2017Updated 9 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆18Oct 19, 2023Updated 2 years ago
- Map2Check: Finding Software Vulnerabilities☆30Nov 13, 2020Updated 5 years ago
- ☆19Jan 2, 2021Updated 5 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 4 years ago
- An index of archived code and papers. Open an issue to request an addition.☆23Jan 7, 2020Updated 6 years ago