dessertlab / fantastic_beastsView external linksLinks
The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.
☆69Jun 7, 2019Updated 6 years ago
Alternatives and similar repositories for fantastic_beasts
Users that are interested in fantastic_beasts are comparing it to the libraries listed below
Sorting:
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆580Jun 22, 2020Updated 5 years ago
- FANS: Fuzzing Android Native System Services☆265Sep 23, 2020Updated 5 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆354Jan 10, 2021Updated 5 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 3 years ago
- Android application fuzzing framework with fuzzers and crash monitor.☆292Oct 2, 2020Updated 5 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 5 years ago
- Collections of my POCs for android vendor CVEs☆285Aug 26, 2023Updated 2 years ago
- a simple frida-based fuzzer for skylight based on @ret2systems pwn2own work☆30May 19, 2019Updated 6 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Jun 25, 2021Updated 4 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74May 24, 2019Updated 6 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Jun 26, 2021Updated 4 years ago
- some vul☆789Apr 25, 2025Updated 9 months ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆185May 2, 2021Updated 4 years ago
- ☆29Jan 7, 2021Updated 5 years ago
- COVA - A static analysis tool to compute path conditions☆40Jul 12, 2025Updated 7 months ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Apr 12, 2023Updated 2 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- A new type of js fuzzer☆26Feb 10, 2020Updated 6 years ago
- Frida-based general purpose fuzzer☆221Aug 13, 2020Updated 5 years ago
- Fuzzing Android program with american fuzzy lop (AFL)☆332Mar 24, 2018Updated 7 years ago
- CPython bytecode instrumentation and forkserver tools for fuzzing pure python and mixed python/c code using AFL☆31Apr 4, 2021Updated 4 years ago
- ☆352Aug 29, 2024Updated last year
- ARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.☆115Oct 1, 2019Updated 6 years ago
- Worst Android kernel fuzzer☆45Aug 12, 2020Updated 5 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Dec 19, 2019Updated 6 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- baichuan SDK 5.4.x逆向☆10Sep 27, 2020Updated 5 years ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆519Jan 18, 2022Updated 4 years ago
- A portable utility to locate android binder service☆99Sep 28, 2019Updated 6 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Nov 27, 2021Updated 4 years ago
- ☆567May 30, 2018Updated 7 years ago
- walk into Android security step by step☆103Aug 15, 2018Updated 7 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago