DARPA Challenges Sets for Linux, Windows, and macOS
☆536Jun 29, 2023Updated 2 years ago
Alternatives and similar repositories for cb-multios
Users that are interested in cb-multios are comparing it to the libraries listed below
Sorting:
- DARPA Cyber Grand Challenge Sample Challenges☆331Jun 6, 2018Updated 7 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- Driller: augmenting AFL with symbolic execution!☆964Mar 24, 2025Updated 11 months ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- ☆387Oct 28, 2019Updated 6 years ago
- SymCC: efficient compiler-based symbolic execution☆862Updated this week
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆739Apr 26, 2025Updated 10 months ago
- LAVA: Large-scale Automated Vulnerability Addition☆409Feb 1, 2026Updated last month
- A ground-truth fuzzing benchmark suite based on real programs with real bugs.☆335Jan 11, 2026Updated 2 months ago
- Symbolic execution tool☆3,841Feb 13, 2026Updated last month
- Set of tests for fuzzing engines☆1,468Aug 25, 2021Updated 4 years ago
- AFL/QEMU fuzzing with full-system emulation.☆641Sep 9, 2018Updated 7 years ago
- A unit test-like interface for fuzzing and symbolic execution☆856Aug 22, 2025Updated 6 months ago
- source code for savior fuzzer☆127Oct 1, 2020Updated 5 years ago
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆955Jul 18, 2022Updated 3 years ago
- ☆400Sep 23, 2021Updated 4 years ago
- neural network assisted fuzzer☆413May 24, 2020Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- AFLFast (extends AFL with Power Schedules)☆422Jun 16, 2023Updated 2 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆610Jun 18, 2023Updated 2 years ago
- Release Branches for MoFlow☆307Nov 10, 2015Updated 10 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆520Jan 18, 2022Updated 4 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,313Jan 6, 2026Updated 2 months ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆656Jan 12, 2026Updated 2 months ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆419Jun 6, 2018Updated 7 years ago
- Directed Greybox Fuzzing with AFL☆555Mar 13, 2024Updated 2 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,617Jun 11, 2025Updated 9 months ago
- FuzzBench - Fuzzer benchmarking as a service.☆1,187Jan 26, 2026Updated last month
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆177Apr 19, 2024Updated last year
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- ☆252Mar 13, 2020Updated 6 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- Platform for Architecture-Neutral Dynamic Analysis☆2,726Feb 14, 2026Updated last month