DARPA Challenges Sets for Linux, Windows, and macOS
☆536Jun 29, 2023Updated 2 years ago
Alternatives and similar repositories for cb-multios
Users that are interested in cb-multios are comparing it to the libraries listed below
Sorting:
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆328Jun 6, 2018Updated 7 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- Driller: augmenting AFL with symbolic execution!☆964Mar 24, 2025Updated 11 months ago
- ☆386Oct 28, 2019Updated 6 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆736Apr 26, 2025Updated 10 months ago
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- Symbolic execution tool☆3,838Feb 13, 2026Updated 2 weeks ago
- SymCC: efficient compiler-based symbolic execution☆856May 12, 2025Updated 9 months ago
- Release Branches for MoFlow☆307Nov 10, 2015Updated 10 years ago
- Set of tests for fuzzing engines☆1,467Aug 25, 2021Updated 4 years ago
- A ground-truth fuzzing benchmark suite based on real programs with real bugs.☆334Jan 11, 2026Updated last month
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- source code for savior fuzzer☆127Oct 1, 2020Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- LAVA: Large-scale Automated Vulnerability Addition☆409Feb 1, 2026Updated 3 weeks ago
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆954Jul 18, 2022Updated 3 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆654Jan 12, 2026Updated last month
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- A unit test-like interface for fuzzing and symbolic execution☆852Aug 22, 2025Updated 6 months ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆418Jun 6, 2018Updated 7 years ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,310Jan 6, 2026Updated last month
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- AFLFast (extends AFL with Power Schedules)☆422Jun 16, 2023Updated 2 years ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆520Jan 18, 2022Updated 4 years ago
- neural network assisted fuzzer☆413May 24, 2020Updated 5 years ago
- ☆400Sep 23, 2021Updated 4 years ago
- FairFuzz: AFL extension targeting rare branches☆252Feb 19, 2019Updated 7 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆608Jun 18, 2023Updated 2 years ago
- Directed Greybox Fuzzing with AFL☆553Mar 13, 2024Updated last year
- Cross Platform Kernel Fuzzer Framework☆457Oct 11, 2018Updated 7 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,612Jun 11, 2025Updated 8 months ago
- Platform for Architecture-Neutral Dynamic Analysis☆2,719Feb 14, 2026Updated 2 weeks ago
- ☆252Mar 13, 2020Updated 5 years ago
- Produce code coverage results with gcov from afl-fuzz test cases☆490Jun 22, 2024Updated last year