cpuu / awesome-fuzzing
A curated list of awesome Fuzzing(or Fuzz Testing) for software security
☆870Updated last year
Alternatives and similar repositories for awesome-fuzzing:
Users that are interested in awesome-fuzzing are comparing it to the libraries listed below
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆540Updated last year
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,266Updated last week
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,243Updated 2 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,168Updated 4 years ago
- Project page for "The Fuzzing Book"☆1,141Updated 3 weeks ago
- awesome list of browser exploitation tutorials☆2,113Updated last year
- A curated list of awesome directed fuzzing research papers☆493Updated this week
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆330Updated last year
- FuzzBench - Fuzzer benchmarking as a service.☆1,118Updated last week
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆685Updated 3 months ago
- cwe_checker finds vulnerable patterns in binary executables☆1,183Updated last month
- LAVA: Large-scale Automated Vulnerability Addition☆381Updated last month
- Recent Fuzzing Paper☆350Updated 4 years ago
- Directed Greybox Fuzzing with AFL☆520Updated 11 months ago
- List of Awesome Advanced Windows Exploitation References☆1,469Updated 3 years ago
- ☆175Updated 8 months ago
- Set of tests for fuzzing engines☆1,435Updated 3 years ago
- AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)☆897Updated 6 months ago
- the Network Protocol Fuzzer that we will want to use.☆740Updated last year
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆508Updated 3 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆405Updated 2 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆633Updated 2 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆813Updated 4 years ago
- The 'exploitable' GDB plugin☆721Updated 2 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆698Updated 9 months ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆664Updated last month
- A grammar based feedback Fuzzer☆434Updated 5 months ago
- An archive of low-level CTF challenges developed over the years☆617Updated 3 years ago
- A lightweight dynamic instrumentation library☆1,206Updated last month
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,143Updated this week