iasthc / hsuan-fuzzLinks
Hsuan-Fuzz: REST API Fuzzing by Coverage Level Guided Blackbox Testing
☆29Updated 3 years ago
Alternatives and similar repositories for hsuan-fuzz
Users that are interested in hsuan-fuzz are comparing it to the libraries listed below
Sorting:
- Fuzzing with the generated argument☆34Updated 2 years ago
- LN-fuzz: State Sequence Network Protocol Fuzzer☆11Updated 4 years ago
- Saryn: Fuzzing with Taint Inference☆16Updated 3 years ago
- ☆18Updated 4 years ago
- ☆11Updated 5 years ago
- Use k-means improve seed selection.☆13Updated 4 years ago
- Fuzzing tutorial with easy-to-learn labs 🚀☆161Updated 2 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Updated 3 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Updated 2 years ago
- Fuzzing with the generated argument and environment variable☆10Updated 3 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆198Updated 3 years ago
- a blackbox network fuzzer for IoT devices☆54Updated 11 months ago
- ☆105Updated 6 years ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- AFL/AFL++ version FishFuzz☆92Updated 4 months ago
- QilingLab challenge writeup☆21Updated 3 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆29Updated 2 years ago
- ☆104Updated last year
- ☆70Updated last year
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆29Updated last year
- ☆12Updated 4 years ago
- Automatic Exploit Generation Paper☆90Updated 3 years ago
- ☆24Updated 4 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆84Updated 3 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆99Updated last year
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- Learn how to combine libprotobuf-mutator with libfuzzer & AFL++☆256Updated 10 months ago
- ☆9Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated last year
- Source code of ASAN--☆95Updated last year