shellphish / drillerLinks
Driller: augmenting AFL with symbolic execution!
☆941Updated 2 months ago
Alternatives and similar repositories for driller
Users that are interested in driller are comparing it to the libraries listed below
Sorting:
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- AFL/QEMU fuzzing with full-system emulation.☆634Updated 6 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆609Updated 2 years ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆526Updated last year
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆648Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆581Updated 6 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆644Updated 2 years ago
- Documentation for the angr suite☆843Updated 2 years ago
- ☆681Updated 2 months ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆715Updated last month
- AFLFast (extends AFL with Power Schedules)☆418Updated 2 years ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆513Updated 3 years ago
- The 'exploitable' GDB plugin☆733Updated 2 years ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆821Updated 7 months ago
- LAVA: Large-scale Automated Vulnerability Addition☆401Updated last week
- ☆384Updated 5 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,258Updated 2 years ago
- binary patching from Python☆637Updated last year
- Python bindings for Valgrind's VEX IR.☆358Updated last week
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆419Updated 7 years ago
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆942Updated 2 years ago
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆476Updated 6 months ago
- Generation-based, context-free grammar fuzzer. Refer to https://github.com/posidron/dharma for a maintained version.☆492Updated 3 years ago
- A fuzzer for full VM kernel/driver targets☆720Updated 2 weeks ago
- SymCC: efficient compiler-based symbolic execution☆817Updated last month
- A Kernel fuzzer focusing on race bugs☆367Updated 5 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆451Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆410Updated 3 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆256Updated 3 months ago
- ☆1,032Updated last year