shellphish / driller
Driller: augmenting AFL with symbolic execution!
☆926Updated 3 weeks ago
Alternatives and similar repositories for driller:
Users that are interested in driller are comparing it to the libraries listed below
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆643Updated 2 weeks ago
- AFL/QEMU fuzzing with full-system emulation.☆628Updated 6 years ago
- Documentation for the angr suite☆842Updated last year
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆579Updated 6 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆604Updated last year
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆817Updated 4 months ago
- ☆663Updated 2 weeks ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆638Updated 2 years ago
- LAVA: Large-scale Automated Vulnerability Addition☆394Updated last week
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆511Updated 3 years ago
- AFLFast (extends AFL with Power Schedules)☆417Updated last year
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆415Updated 6 years ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆525Updated last year
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆704Updated 11 months ago
- ☆380Updated 5 years ago
- Bucket and triage on-disk crashes. OSX and Linux.☆357Updated 5 months ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆646Updated 5 years ago
- The 'exploitable' GDB plugin☆727Updated 2 years ago
- Produce code coverage results with gcov from afl-fuzz test cases☆476Updated 9 months ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,254Updated 2 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆490Updated 7 months ago
- Peach is a fuzzing framework which uses a DSL for building fuzzers and an observer based architecture to execute and monitor them.☆409Updated 4 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆320Updated 6 years ago
- SymCC: efficient compiler-based symbolic execution☆800Updated last month
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,778Updated last month
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆405Updated 3 years ago
- american fuzzy lop (copy of the source code for easy access)☆608Updated 7 years ago
- Python bindings for Valgrind's VEX IR.☆350Updated last week
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆254Updated 3 weeks ago
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆942Updated 2 years ago