gamozolabs / fuzz_with_emusLinks
Why fuzzing with emulators is amazing
☆138Updated 4 years ago
Alternatives and similar repositories for fuzz_with_emus
Users that are interested in fuzz_with_emus are comparing it to the libraries listed below
Sorting:
- A super simple RV32i JIT, designed for ease of understanding and modification☆85Updated 2 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆167Updated 4 years ago
- A fast Rust-based safe and thead-friendly grammar-based fuzz generator☆219Updated 4 years ago
- A binary analysis framework written in Rust.☆170Updated 2 weeks ago
- A debugger for Linux in Rust☆76Updated 2 years ago
- A fuzzing introspection tool☆167Updated 4 years ago
- Some Rust bindings for Binary Ninja☆30Updated last year
- Snapshot-based coverage-guided windows kernel fuzzer☆320Updated 3 years ago
- x86 decoders for the yaxpeax project☆138Updated last month
- ☆85Updated 3 months ago
- An architecture-agnostic ELF file flattener for shellcode☆218Updated 3 years ago
- Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.☆113Updated last year
- About as basic of a mutator as you can get, but it does the trick in most situations☆62Updated 4 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆152Updated last year
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆42Updated 2 years ago
- tool for multi-execution jump coverage introspection☆65Updated 5 months ago
- Self-hosting binary instrumentation framework for security research☆215Updated last year
- Generation-based, context-free grammar fuzzer.☆52Updated 2 years ago
- A differential fuzzer for x86 decoders☆250Updated 8 months ago
- AArch64 fuzzer based on the Apple Silicon hypervisor☆198Updated last year
- Binary coverage tool without binary modification for Windows☆437Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Rewriting functions in compiled binaries using McSema☆89Updated 5 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 2 years ago
- ☆81Updated last month
- Symbolic Execution over Falcon IL☆29Updated 3 years ago
- Target-centric program analysis.☆77Updated last week
- Binja Arm64 Disassembler☆95Updated 2 months ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago