junxzm1990 / afl-ptLinks
☆53Updated 6 years ago
Alternatives and similar repositories for afl-pt
Users that are interested in afl-pt are comparing it to the libraries listed below
Sorting:
- ☆96Updated 6 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- AFLTeam Collaborative Parallel Fuzzing☆74Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- ☆98Updated 4 years ago
- ☆66Updated 5 years ago
- Challenging testcases for fuzzers☆71Updated last year
- ☆47Updated 3 years ago
- run AFL with pintool☆66Updated 5 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Signedness-Agnostic Strided-Interval☆37Updated 6 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- ☆38Updated 4 years ago
- Utilities for generating dynamic traces☆92Updated 2 months ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- ☆42Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- ☆16Updated 7 years ago
- ☆55Updated 5 years ago