☆43Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for learch
Users that are interested in learch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- ☆53Nov 1, 2020Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- ☆50Dec 19, 2020Updated 5 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆13Mar 1, 2020Updated 6 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- Fuzz testing framework for binary programs using AI☆53Sep 13, 2023Updated 2 years ago
- This is the project of LearnAFL.☆28Aug 27, 2020Updated 5 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Feb 18, 2020Updated 6 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Oct 26, 2022Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ICSE'22 - Havoc-MAB: Enhancing AFL havoc mutation with Two-layer Multi-Armed Bandit☆12Sep 19, 2022Updated 3 years ago
- ☆12Jul 21, 2023Updated 2 years ago
- ☆73Jun 26, 2024Updated last year
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago
- Nsolv - A front-end that allows multiple SMTLIBv2 compliant solvers to executed in parallel.☆11Dec 7, 2012Updated 13 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 4 years ago
- Static analysis tool to detect missing and incorrect error checks in C and C++ codebases without using a priori knowledge.☆19Feb 11, 2026Updated last month
- KLEE / CSE Project☆48Apr 3, 2020Updated 5 years ago
- An automated theorem prover for intuitionistic propostional logic☆14Sep 21, 2020Updated 5 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆52Jun 18, 2025Updated 9 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Feb 17, 2025Updated last year
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Aug 24, 2020Updated 5 years ago
- Implementations of various toy programming languages☆12Apr 19, 2018Updated 7 years ago
- A Gradual Dependently-typed Language☆14Jun 26, 2019Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- Files for the tutorial "Correct-by-construction programming in Agda" at POPL '19 in Cascais☆26Jan 14, 2019Updated 7 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Experiments with modal types☆17Oct 20, 2020Updated 5 years ago
- Source code of MEUZZ fuzzer☆46Dec 11, 2021Updated 4 years ago
- Syzkaller with MAB scheduling and seed selection☆27Jan 29, 2020Updated 6 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago