eurecom-s3 / invscovLinks
The Use of Likely Invariants as Feedback for Fuzzers
☆90Updated 3 years ago
Alternatives and similar repositories for invscov
Users that are interested in invscov are comparing it to the libraries listed below
Sorting:
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆34Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated last year
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- Challenging testcases for fuzzers☆72Updated last year
- A data-flow-guided fuzzer☆123Updated 2 years ago
- ☆90Updated 3 years ago
- Symbolic Execution Over Processor Traces☆123Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90Updated last year
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- AFLTeam Collaborative Parallel Fuzzing☆74Updated 3 years ago
- ☆26Updated last year
- List the real world programs evaluated in fuzzing papers.☆56Updated 6 years ago
- fuzzing + concolic = fuzzolic :)☆126Updated 3 weeks ago
- ☆46Updated 3 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆159Updated 3 years ago
- afl/afl++ with a hierarchical seed scheduler☆56Updated 3 years ago
- ☆67Updated 5 years ago
- ☆36Updated last year
- Produce code coverage results with gcov from afl-fuzz test cases☆87Updated 9 months ago
- ☆105Updated last year
- ☆55Updated last year
- ☆29Updated 3 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 3 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆31Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated 2 years ago
- ☆73Updated 3 years ago