shellphish / driller
Driller: augmenting AFL with symbolic execution!
☆929Updated last month
Alternatives and similar repositories for driller:
Users that are interested in driller are comparing it to the libraries listed below
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆644Updated last month
- AFL/QEMU fuzzing with full-system emulation.☆629Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆579Updated 6 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆606Updated last year
- ☆672Updated last month
- Documentation for the angr suite☆844Updated 2 years ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆525Updated last year
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆640Updated 2 years ago
- AFLFast (extends AFL with Power Schedules)☆417Updated last year
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆709Updated last week
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆647Updated 6 years ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆818Updated 5 months ago
- The 'exploitable' GDB plugin☆732Updated 2 years ago
- Python bindings for Valgrind's VEX IR.☆352Updated last week
- ☆382Updated 5 years ago
- Produce code coverage results with gcov from afl-fuzz test cases☆476Updated 10 months ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆512Updated 3 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆492Updated 8 months ago
- LAVA: Large-scale Automated Vulnerability Addition☆397Updated 3 weeks ago
- Exercises to learn how to fuzz with American Fuzzy Lop