System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)
☆46Dec 1, 2017Updated 8 years ago
Alternatives and similar repositories for TriforceOpenBSDFuzzer
Users that are interested in TriforceOpenBSDFuzzer are comparing it to the libraries listed below
Sorting:
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- A linux system call fuzzer using TriforceAFL☆177Feb 28, 2024Updated 2 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Jul 22, 2016Updated 9 years ago
- Python concolic execution framework for program analysis☆68Nov 13, 2014Updated 11 years ago
- Fuzzers for the Linux kernel☆118Oct 14, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Mar 17, 2015Updated 10 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Jan 17, 2017Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- Unofficial OpenBSD regression tests☆21Mar 24, 2021Updated 4 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆189May 21, 2021Updated 4 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Fuzzing Android program with american fuzzy lop (AFL)☆333Mar 24, 2018Updated 7 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- AFLFast (extends AFL with Power Schedules)☆422Jun 16, 2023Updated 2 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- A prototype system call fuzzer.☆14Apr 16, 2017Updated 8 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- BSD-licensed CTF Implementation☆21Jul 18, 2015Updated 10 years ago
- Kernel debugger using Timeless Debugging method.☆74Feb 16, 2017Updated 9 years ago
- Linux system call fuzzer☆900Sep 2, 2025Updated 6 months ago
- Fuzzinator Random Testing Framework☆194Nov 23, 2025Updated 3 months ago
- Patches to the Nexus 6 (Shamu) kernel source to allow KGDB over serial debug cable☆32Mar 11, 2019Updated 6 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- ☆23Sep 21, 2014Updated 11 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆315Jun 25, 2020Updated 5 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- tool for statically reconstructing the IOKit classes hierarchy from iOS kernelcache dumps☆109Jul 4, 2016Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago