dvorak42 / confuzzerLinks
Concolic Execution Fuzzer
☆24Updated 3 years ago
Alternatives and similar repositories for confuzzer
Users that are interested in confuzzer are comparing it to the libraries listed below
Sorting:
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- ☆53Updated 6 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- experiments for IJON☆12Updated 6 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆14Updated 6 years ago
- Fuzzing with controlled compilation☆30Updated 2 years ago
- ☆12Updated 4 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- ☆47Updated 5 years ago
- ☆96Updated 6 years ago
- ☆53Updated 7 years ago
- ☆16Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- CRETE under development☆59Updated 5 years ago
- run AFL with pintool☆66Updated 5 years ago
- Utilities for generating dynamic traces☆93Updated 5 months ago
- ☆38Updated 5 years ago
- The collection of programs for evaluating fuzzing techniques☆20Updated 7 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Fuzzing Parsers with Tokens☆33Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Updated 7 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- ☆24Updated 6 years ago
- ☆16Updated 7 years ago