nezlooy / pyZZUF
Python implementation of zzuf mutator - little bit-flip atomic bomb
☆71Updated 8 years ago
Alternatives and similar repositories for pyZZUF:
Users that are interested in pyZZUF are comparing it to the libraries listed below
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆47Updated 8 years ago
- Malamute is a fuzzing toolkit initially developed to aid with regression-test based fuzzing of language interpreters☆26Updated 9 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆26Updated 13 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- ☆61Updated 9 years ago
- AFL "mostly" ported to cygwin☆26Updated 8 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- PoC for CVE-2015-6086☆68Updated 8 years ago
- ☆25Updated 8 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- ☆48Updated 7 years ago
- ☆28Updated 2 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- Some stuffs for CODE BLUE 2016☆21Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 4 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- A multi-codec media fuzzing tool.☆42Updated 12 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆85Updated 4 years ago
- exploit development☆49Updated 6 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- covFuzz☆34Updated 7 years ago