sefcom / operation-mango-publicLinks
☆87Updated 6 months ago
Alternatives and similar repositories for operation-mango-public
Users that are interested in operation-mango-public are comparing it to the libraries listed below
Sorting:
- ☆236Updated last year
- ☆92Updated 7 months ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- ☆65Updated 2 years ago
- Material and examples for a presentation on static binary analysis.☆45Updated 4 years ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆116Updated 7 months ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆93Updated 3 years ago
- ☆30Updated 2 years ago
- ☆43Updated 2 years ago
- ☆28Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆46Updated 2 years ago
- ☆58Updated last year
- Coverage-guided Fuzzing as Online Stochastic Control☆55Updated last year
- A data-flow-guided fuzzer☆124Updated 2 years ago
- a blackbox network fuzzer for IoT devices☆55Updated last year
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆170Updated 2 years ago
- Linux Kernel Fuzzer Corpus☆152Updated this week
- ☆29Updated 2 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆113Updated 3 weeks ago
- Companion repository to the Fuzzing101 with LibAFL series of blog posts.☆157Updated 9 months ago
- ☆80Updated 2 years ago
- Linux kernel privilege escalation techniques☆146Updated last year
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Updated 2 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆48Updated 6 months ago
- Produce code coverage results with gcov from afl-fuzz test cases☆89Updated 10 months ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- Automatic Exploit Generation Paper☆90Updated 3 years ago
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆15Updated 3 years ago
- ☆69Updated last year
- Repository for monolithic firmware blobs☆85Updated 3 years ago