junxzm1990 / pomp
☆56Updated 4 years ago
Alternatives and similar repositories for pomp:
Users that are interested in pomp are comparing it to the libraries listed below
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆99Updated 5 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆92Updated 7 years ago
- ☆53Updated 5 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Modular And Compositional analysis with KLEE Engine☆115Updated 5 years ago
- ☆96Updated 5 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- ☆63Updated 5 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- Utilities for generating dynamic traces☆90Updated 2 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 7 years ago
- run AFL with pintool☆65Updated 5 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆124Updated 2 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- ☆80Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆101Updated 2 years ago
- ☆70Updated 5 years ago
- OSS-Fuzz - integrated with AFLGo for Patch Testing☆35Updated 7 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 5 years ago
- ☆48Updated 4 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated 11 months ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 10 months ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆79Updated 6 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 5 years ago