stephenfewer / grinderLinks
Grinder is a system to automate the fuzzing of web browsers and the management of a large number of crashes.
☆419Updated 3 years ago
Alternatives and similar repositories for grinder
Users that are interested in grinder are comparing it to the libraries listed below
Sorting:
- A distributed fuzzing testing suite with web administration☆373Updated 6 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 10 years ago
- Release Branches for MoFlow☆306Updated 10 years ago
- Repository to train/learn memory corruption on the ARM platform.☆357Updated 8 years ago
- Wadi Fuzzing Harness☆127Updated 8 years ago
- 2016 DEF CON Qualifier Challenges☆178Updated 9 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last week
- afl-fuzz for javascript☆203Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆271Updated last year
- GATEKEEPER: Inline and on-target defense☆121Updated 3 years ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- fuzz☆124Updated 10 years ago
- This project contains the source code for the CERT Basic Fuzzing Framework (BFF) and the CERT Failure Observation Engine (FOE).☆271Updated 5 months ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆289Updated 9 years ago
- Hodor! Fuzzer..☆129Updated 9 years ago
- An open source, multi-architecture ROP compiler written in python☆163Updated 8 years ago
- ☆85Updated 5 years ago
- ☆237Updated 7 years ago
- ☆141Updated 8 years ago
- The first open source vulnerability scanner for firmwares☆196Updated 9 years ago
- Media Fuzzing Framework for Android☆332Updated 9 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆518Updated 7 months ago
- A linux system call fuzzer using TriforceAFL☆177Updated last year
- Documentation for the Mechanical Phish.☆235Updated 9 years ago
- jemalloc heap exploitation framework☆464Updated 4 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Updated 8 years ago
- CTF writeups☆113Updated 8 years ago
- A tool to predict vulnerability discovery of binary only programs☆187Updated 8 years ago
- Automated Exploit generation with WinDBG☆191Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 9 years ago