fuzzitdev / example-cLinks
This is an example of a project with continuous fuzzing integration
☆11Updated 5 years ago
Alternatives and similar repositories for example-c
Users that are interested in example-c are comparing it to the libraries listed below
Sorting:
- A coverage-based software testing tool☆34Updated 5 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- ☆47Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 8 years ago
- Configurable instrumentation of LLVM bitcode☆35Updated 10 months ago
- experiments for IJON☆12Updated 6 years ago
- CRETE under development☆60Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Updated 5 years ago
- Tool for detecting error handling bugs☆23Updated 9 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated 2 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Updated 3 years ago
- Fuzzing Parsers with Tokens☆33Updated 5 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆75Updated 4 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Updated 8 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75Updated 4 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 3 years ago
- The BAP tutorial☆73Updated 3 years ago
- ☆53Updated 6 years ago
- Explore LLVM Bitcode interactively using a graph database☆58Updated 5 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆135Updated 4 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Updated 6 years ago
- Program analysis tools developed at Draper on the CBAT project.☆106Updated 2 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- Pandemic binary program analysis framework in OCaml (abandoned)☆71Updated 6 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Recover mutation graph from an AFL seed☆59Updated 5 years ago