sefcom / Witcher
Witcher is the first framework for using AFL to fuzz web applications.
☆80Updated last year
Alternatives and similar repositories for Witcher:
Users that are interested in Witcher are comparing it to the libraries listed below
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆63Updated 6 months ago
- A set of Code-ql/Joern queries to find vulnerabilities☆57Updated 3 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆93Updated last year
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache (ACM CCS 2024)☆10Updated 3 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆45Updated last month
- ☆17Updated 2 years ago
- ☆24Updated last year
- Artifact for ICSE 2023☆46Updated 2 years ago
- AFL/AFL++ version FishFuzz☆88Updated 10 months ago
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆45Updated last year
- A browser fuzzer augmented by API mod-ref relations☆31Updated 11 months ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆64Updated last month
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆11Updated 4 months ago
- Automatic Exploit Generation Paper☆84Updated 3 years ago
- ☆13Updated 5 years ago
- An automated ROP generation work☆10Updated last year
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆162Updated 5 months ago
- A GPT-Based Fuzz Driver Generator☆46Updated last year
- MINER provided by the paper "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing"☆37Updated last year
- ☆66Updated 3 years ago
- ☆106Updated 9 months ago
- ☆34Updated 2 years ago
- 模糊测试种子库 comprehensive croups for fuzzing seeds with carfefully selected(rate=coverage/filesize)☆22Updated 3 years ago
- ☆36Updated 2 years ago
- ☆10Updated 6 months ago
- attachments and (some) writeups/source code for RWCTF 6th☆111Updated last year
- ☆21Updated 2 years ago
- ☆72Updated 2 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆12Updated 2 months ago
- Debug pwn in docker, no need for virtual machines☆35Updated 2 years ago