seclab-yonsei / intriguerLinks
Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing
☆34Updated last year
Alternatives and similar repositories for intriguer
Users that are interested in intriguer are comparing it to the libraries listed below
Sorting:
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆89Updated 3 years ago
- Symbolic Execution Over Processor Traces☆121Updated 9 months ago
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated last year
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- AFLTeam Collaborative Parallel Fuzzing☆74Updated 2 years ago
- ☆90Updated 3 years ago
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- ☆55Updated last year
- A data-flow-guided fuzzer☆119Updated last year
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- ☆46Updated 3 years ago
- List the real world programs evaluated in fuzzing papers.☆56Updated 6 years ago
- ☆23Updated last month
- ☆13Updated 8 months ago
- ☆18Updated 2 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆34Updated last year
- ☆34Updated 4 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated 2 years ago
- MTFuzz: Fuzzing with a Multi-Task Neural Network☆35Updated 4 years ago
- ☆14Updated 7 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- An Automated Heap Feng Shui Tool☆16Updated 2 years ago
- ☆68Updated 11 months ago