fkie-cad / butterflyLinks
LibAFL components for stateful fuzzing
☆51Updated 3 years ago
Alternatives and similar repositories for butterfly
Users that are interested in butterfly are comparing it to the libraries listed below
Sorting:
- Snapshot fuzzing with KVM and LibAFL☆96Updated 3 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- ☆86Updated 5 months ago
- ☆79Updated 2 years ago
- A data-flow-guided fuzzer☆122Updated 2 years ago
- ☆25Updated last year
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆203Updated 3 years ago
- An example fuzzer about how to fuzz a JS engine combinign Nautilus with Token-level fuzzing☆46Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated 2 years ago
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- ☆36Updated last year
- ☆75Updated 3 years ago
- Material and examples for a presentation on static binary analysis.☆45Updated 4 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆81Updated 7 months ago
- fuzzing + concolic = fuzzolic :)☆125Updated this week
- Produce code coverage results with gcov from afl-fuzz test cases☆87Updated 8 months ago
- The Use of Likely Invariants as Feedback for Fuzzers☆89Updated 3 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆140Updated 4 years ago
- ☆55Updated last year
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆90Updated 3 years ago
- ☆42Updated 2 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆81Updated last month
- AFLplusplus + libprotobuf-mutator☆59Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆89Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- Challenging testcases for fuzzers☆72Updated last year
- ☆48Updated 3 years ago
- ☆39Updated 2 years ago
- Symbolic Execution Over Processor Traces☆122Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year