ron4548 / PISELinks
☆77Updated 3 years ago
Alternatives and similar repositories for PISE
Users that are interested in PISE are comparing it to the libraries listed below
Sorting:
- ☆188Updated 9 months ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆165Updated 4 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Updated 4 years ago
- ☆92Updated 6 months ago
- ☆136Updated 3 years ago
- A de-socketing library for fuzzing.☆161Updated 5 months ago
- ☆153Updated 8 months ago
- ☆137Updated 4 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆87Updated last month
- ☆78Updated 3 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆93Updated 3 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 3 years ago
- ☆199Updated 2 years ago
- ☆91Updated 9 months ago
- ☆99Updated 5 years ago
- PASTIS: Collaborative Fuzzing Framework☆163Updated 2 months ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆127Updated 8 years ago
- Automated IoT firmware fuzzing framework.☆84Updated 6 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- Automatic ROPChain Generation☆293Updated 5 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆128Updated 2 years ago
- The new phuzzing framework!☆163Updated last year
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Updated 3 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆154Updated last year
- ☆200Updated 2 years ago
- ☆20Updated 3 years ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆206Updated 4 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Updated 4 years ago