sefcom / operation-mango-publicLinks
☆86Updated 5 months ago
Alternatives and similar repositories for operation-mango-public
Users that are interested in operation-mango-public are comparing it to the libraries listed below
Sorting:
- ☆233Updated last year
- ☆92Updated 6 months ago
- ☆64Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆110Updated 6 months ago
- Material and examples for a presentation on static binary analysis.☆45Updated 4 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆92Updated 3 years ago
- ☆30Updated 2 years ago
- ☆42Updated 2 years ago
- ☆26Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆45Updated 2 years ago
- Companion repository to the Fuzzing101 with LibAFL series of blog posts.☆157Updated 8 months ago
- ☆58Updated last year
- A data-flow-guided fuzzer☆123Updated 2 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆54Updated 11 months ago
- a blackbox network fuzzer for IoT devices☆55Updated last year
- Linux Kernel Fuzzer Corpus☆150Updated this week
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆170Updated 2 years ago
- ☆80Updated 2 years ago
- ☆29Updated 2 years ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- A browser fuzzer augmented by API mod-ref relations☆33Updated last year
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆143Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆113Updated 2 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆32Updated 2 years ago
- ☆132Updated last year
- ☆69Updated last year
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆90Updated 3 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Updated last year