dvorak42 / confuzzerLinks
Concolic Execution Fuzzer
☆24Updated 3 years ago
Alternatives and similar repositories for confuzzer
Users that are interested in confuzzer are comparing it to the libraries listed below
Sorting:
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- experiments for IJON☆12Updated 5 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Updated 6 years ago
- ☆12Updated 3 years ago
- ☆20Updated 3 years ago
- Recover mutation graph from an AFL seed☆60Updated 4 years ago
- ☆12Updated 2 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 6 months ago
- ☆24Updated 6 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- The collection of programs for evaluating fuzzing techniques☆20Updated 7 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Updated 5 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- A coverage-based software testing tool☆34Updated 4 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Updated 4 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆37Updated 5 years ago
- This is the project of LearnAFL.☆28Updated 4 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- ☆53Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆47Updated 8 years ago
- The tools used to train the models used for the ICISC paper "Recurrent neural networks for fuzz testing web browsers"☆28Updated 6 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- ☆11Updated 6 years ago