A pip wrapper around AFL.
☆87Apr 12, 2021Updated 4 years ago
Alternatives and similar repositories for shellphish-afl
Users that are interested in shellphish-afl are comparing it to the libraries listed below
Sorting:
- A pip wrapper around our ridiculous amount of qemu forks.☆51Feb 9, 2026Updated 2 weeks ago
- AFL, with scripts to support other architectures.☆97Nov 7, 2018Updated 7 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆654Jan 12, 2026Updated last month
- ☆27May 29, 2015Updated 10 years ago
- Driller: augmenting AFL with symbolic execution!☆964Mar 24, 2025Updated 11 months ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆265Jan 13, 2026Updated last month
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- QEMU modified to run CGC binaries.☆13Apr 12, 2022Updated 3 years ago
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 11 months ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- ☆252Mar 13, 2020Updated 5 years ago
- ☆16Mar 26, 2017Updated 8 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 7 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- CFE virtual competition framework☆14Feb 1, 2017Updated 9 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- ☆51Mar 23, 2018Updated 7 years ago
- framework for fuzzing various open source tools☆18Jul 24, 2015Updated 10 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆56Nov 11, 2019Updated 6 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 9 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆520Jan 18, 2022Updated 4 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- afl-fuzz for javascript☆203Feb 11, 2017Updated 9 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz)☆93Aug 21, 2017Updated 8 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago