Reference material for fuzzing and creating fuzzers
☆19Apr 6, 2019Updated 6 years ago
Alternatives and similar repositories for fuzref
Users that are interested in fuzref are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- Ruby ALPC Fuzzer ( joke )☆24Oct 12, 2014Updated 11 years ago
- Fuzzing tool for DNS Full-Service-Resolvers.☆12Sep 15, 2025Updated 6 months ago
- Foxit Image Converter Fuzzing Harness☆17Jun 11, 2020Updated 5 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- ☆27Jan 8, 2022Updated 4 years ago
- ntoskrnl symbol pdb and undocument structures☆25Oct 25, 2017Updated 8 years ago
- adobe afdko fuzz☆41Aug 12, 2019Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- iOS forensics utility☆13May 8, 2018Updated 7 years ago
- Python portage of the Microcode Explorer plugin☆32Mar 26, 2019Updated 6 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated this week
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated 2 weeks ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆96Nov 4, 2021Updated 4 years ago
- Target components for kAFL/Nyx Fuzzer☆34Jul 21, 2025Updated 8 months ago
- A DOM fuzzer.☆83Nov 17, 2021Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30May 24, 2020Updated 5 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Jan 12, 2023Updated 3 years ago
- Bypass iOS PIN Passcode☆10May 16, 2014Updated 11 years ago
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Automated provisioning of Santoku Linux (configuration of an Ubuntu VM containing the Android development environment, including Android …☆11Mar 4, 2014Updated 12 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Aug 5, 2023Updated 2 years ago
- Exploits solution for CrackLatinos challenges☆17Sep 29, 2019Updated 6 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago