shellphish / driller
Driller: augmenting AFL with symbolic execution!
☆912Updated 2 years ago
Alternatives and similar repositories for driller:
Users that are interested in driller are comparing it to the libraries listed below
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆642Updated last week
- AFL/QEMU fuzzing with full-system emulation.☆628Updated 6 years ago
- Documentation for the angr suite☆837Updated last year
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆577Updated 6 years ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆525Updated last year
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆634Updated 2 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆602Updated last year
- ☆640Updated last week
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆698Updated 9 months ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆812Updated 3 months ago
- The 'exploitable' GDB plugin☆723Updated 2 years ago
- ☆379Updated 5 years ago
- AFLFast (extends AFL with Power Schedules)☆415Updated last year
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆508Updated 3 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆255Updated last month
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,245Updated 2 years ago
- Python bindings for Valgrind's VEX IR.☆346Updated this week
- Bucket and triage on-disk crashes. OSX and Linux.☆354Updated 4 months ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆415Updated 6 years ago
- ☆379Updated 3 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆646Updated 5 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆401Updated 3 years ago
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆938Updated 2 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆490Updated 5 months ago
- SymCC: efficient compiler-based symbolic execution☆796Updated 7 months ago
- LAVA: Large-scale Automated Vulnerability Addition☆383Updated this week
- Directed Greybox Fuzzing with AFL☆523Updated 11 months ago
- neural network assisted fuzzer☆400Updated 4 years ago
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆460Updated 2 months ago
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆283Updated 5 years ago