kuc001 / EmTaintLinks
☆38Updated 2 years ago
Alternatives and similar repositories for EmTaint
Users that are interested in EmTaint are comparing it to the libraries listed below
Sorting:
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- ☆89Updated 4 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆29Updated 2 years ago
- ☆30Updated 2 years ago
- ☆70Updated last year
- ☆56Updated last year
- implementing collafl☆26Updated 5 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated last year
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- ☆28Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆98Updated 2 years ago
- ☆34Updated 4 years ago
- ☆25Updated 11 months ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- A data-flow-guided fuzzer☆122Updated 2 years ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆120Updated 2 years ago
- a blackbox network fuzzer for IoT devices☆54Updated 11 months ago
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- Material and examples for a presentation on static binary analysis.☆45Updated 4 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆63Updated last year
- MS-Fuzz data☆15Updated 2 years ago
- ☆62Updated last year
- ☆28Updated 3 years ago
- ☆18Updated 2 years ago
- ☆25Updated last month
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last month
- Syzkaller with MAB scheduling and seed selection☆24Updated 5 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆62Updated 8 months ago