ortegaalfredo / crashbench
Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs
☆13Updated 6 months ago
Alternatives and similar repositories for crashbench
Users that are interested in crashbench are comparing it to the libraries listed below
Sorting:
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- ☆14Updated 2 years ago
- Regular expression Search on the command-line☆16Updated last month
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- CTF writeups☆9Updated 5 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Updated 5 months ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- ☆12Updated 4 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- ☆9Updated 6 years ago
- Joern Workshops☆26Updated 4 months ago
- File permission and SIP misbehaviour hunter☆13Updated 2 years ago
- Diaphora Machine Learning tools and datasets☆21Updated 7 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- A stateful fuzzing engine.☆45Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- My public presentations☆41Updated 2 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- A project for simulating fuzzing such that analysis can be done on coverage/feedback/scaling mechanisms☆9Updated 5 years ago
- ☆17Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆11Updated 5 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆16Updated 2 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 7 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- A MBR Fuzzer☆29Updated last year
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Decrypt encrypted SonicOSX firmware images☆14Updated 2 months ago
- Exploit Firefox Vulnerability☆23Updated 4 years ago