gamozolabs / guifuzzLinks
A GUI fuzzing application set up to fuzz calc.exe right now
☆36Updated 4 years ago
Alternatives and similar repositories for guifuzz
Users that are interested in guifuzz are comparing it to the libraries listed below
Sorting:
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆69Updated 5 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- ☆47Updated 2 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆27Updated 6 years ago
- haze binary fuzzer☆53Updated last year
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- A monitoring script for AFL☆40Updated 8 years ago
- ☆31Updated 5 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- Automatic Exploit Generation from Primitives☆11Updated 6 years ago
- [CVE-2017-10235] Description and PoC of VirtualBox E1000 device Buffer Overflow☆34Updated 7 years ago
- ☆68Updated last year
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- Ditto.☆17Updated 4 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆36Updated 6 years ago
- ☆96Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- ☆63Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 4 years ago
- ☆85Updated last year
- About as basic of a mutator as you can get, but it does the trick in most situations☆62Updated 4 years ago
- ☆22Updated 6 years ago