junxzm1990 / iot-securityLinks
☆23Updated 3 years ago
Alternatives and similar repositories for iot-security
Users that are interested in iot-security are comparing it to the libraries listed below
Sorting:
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- ☆18Updated 2 years ago
- A data-flow-guided fuzzer☆124Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆46Updated 2 years ago
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- Symbolic Execution Over Processor Traces☆124Updated last year
- UAF Fuzzing Benchmark☆57Updated 4 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆34Updated last year
- ☆81Updated 4 years ago
- ☆28Updated last year
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- ☆30Updated 3 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆55Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆113Updated 3 weeks ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆143Updated last year
- A regression greybox fuzzer aflchurn☆67Updated 3 years ago
- a blackbox network fuzzer for IoT devices☆55Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Updated 4 years ago
- ☆36Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 4 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆91Updated 3 years ago
- ☆43Updated 2 years ago
- ☆56Updated last year
- Run fuzzing experiments in Docker☆101Updated 4 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 11 months ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- ☆80Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- ☆90Updated 4 years ago