sweetchipsw / sweetmon2Links
'SWEETMON2' is a fuzzer monitoring service based Python3 + Django2. User can manage their fuzzers and crashes on the web. It can reduce repetitive work for fuzz testers.
☆11Updated 5 years ago
Alternatives and similar repositories for sweetmon2
Users that are interested in sweetmon2 are comparing it to the libraries listed below
Sorting:
- QEMU to drcov trace file☆11Updated 4 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- ☆13Updated 4 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- A monitoring script for AFL☆40Updated 8 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 6 years ago
- Simple file fuzzing harness for ASAN binaries written in Go☆8Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- defcon framework by SeoulPlusBadass☆18Updated 2 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Updated 5 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- ☆12Updated 3 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- IDA (sort of) headless☆24Updated last year
- ☆22Updated 6 years ago
- ☆74Updated 7 years ago
- ☆17Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 7 years ago