thuanpv / aflnweView external linksLinks
☆13Oct 1, 2020Updated 5 years ago
Alternatives and similar repositories for aflnwe
Users that are interested in aflnwe are comparing it to the libraries listed below
Sorting:
- Convert a raw firmware image to an ELF file.☆13Feb 6, 2019Updated 7 years ago
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 4 years ago
- Extended library for using direct system calls on windows☆17Feb 6, 2022Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- IKE fuzzer☆29May 29, 2015Updated 10 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Oct 1, 2023Updated 2 years ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆15Nov 11, 2022Updated 3 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 9 years ago
- Re-implementation of the protocol reverse engineering approach FieldHunter☆17Oct 17, 2022Updated 3 years ago
- ☆17Mar 2, 2018Updated 7 years ago
- ☆19Dec 4, 2023Updated 2 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- Code for PathAFL on ASIACCS 2020. Please see README_CN.md. Please wait for README_EN.md.☆18Nov 11, 2020Updated 5 years ago
- Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework☆23Jan 27, 2021Updated 5 years ago
- ☆26Updated this week
- DOM fuzzers - not maintained anymore☆17Oct 10, 2019Updated 6 years ago
- LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI☆29Aug 8, 2024Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- ☆97Sep 29, 2025Updated 4 months ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Jun 18, 2024Updated last year
- A fuzzing framework for network servers☆121Oct 22, 2018Updated 7 years ago
- ☆32Apr 2, 2024Updated last year
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- kAFL Fuzzer☆34Mar 12, 2025Updated 11 months ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆22Updated this week
- A coverage-based software testing tool☆34Dec 11, 2020Updated 5 years ago
- Network and USB protocol fuzzing toolkit.☆69Jul 25, 2018Updated 7 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- ☆78Sep 2, 2022Updated 3 years ago
- ☆39May 31, 2024Updated last year
- Static code analysis test source code☆36Aug 30, 2023Updated 2 years ago