sefcom / operation-mango-publicLinks
☆93Updated 9 months ago
Alternatives and similar repositories for operation-mango-public
Users that are interested in operation-mango-public are comparing it to the libraries listed below
Sorting:
- ☆238Updated 2 years ago
- ☆94Updated 10 months ago
- ☆69Updated 2 years ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆128Updated 10 months ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆95Updated 3 years ago
- Material and examples for a presentation on static binary analysis.☆46Updated 4 years ago
- ☆47Updated 2 years ago
- ☆65Updated last year
- ☆31Updated 2 years ago
- Linux kernel privilege escalation techniques☆152Updated last year
- ☆30Updated last year
- a blackbox network fuzzer for IoT devices☆56Updated last year
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆171Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Updated 2 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆58Updated last year
- A data-flow-guided fuzzer☆124Updated 2 years ago
- Companion repository to the Fuzzing101 with LibAFL series of blog posts.☆166Updated 11 months ago
- ☆33Updated 2 years ago
- Linux Kernel Fuzzer Corpus☆155Updated this week
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- Automatic Exploit Generation Paper☆89Updated 4 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆120Updated 3 months ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50Updated 9 months ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Updated 2 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Updated 2 years ago
- ☆81Updated 2 years ago
- ☆78Updated 3 years ago
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆16Updated 3 years ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago