trailofbits / testing-handbook
Trail of Bits Testing Handbook
โ65Updated 2 weeks ago
Alternatives and similar repositories for testing-handbook:
Users that are interested in testing-handbook are comparing it to the libraries listed below
- Coverage-Guided Greybox Distributed Fuzzerโ130Updated 7 months ago
- CodeQL queries developed by Trail of Bitsโ89Updated 3 months ago
- Manager of third-party sources of Semgrep rules ๐โ81Updated 8 months ago
- A coverage-guided REST API fuzzer developed on top of LibAFLโ115Updated last week
- Automatically fuzz Rust projects from scratchโ55Updated 10 months ago
- ๐A cutting edge context aware GraphQL API fuzzing tool!โ135Updated this week
- โ77Updated 9 months ago
- CQ, a code security scannerโ99Updated 10 months ago
- XBOW Validation Benchmarksโ76Updated 6 months ago
- โ44Updated 8 months ago
- Automated vulnerability discovery and annotationโ65Updated 8 months ago
- โ114Updated last year
- Common Corpus is used to build coverage-minimized corpus data sets for fuzzing.โ26Updated last year
- CVE querying library and utility that uses a local store syncing directly to the National Vulnerability Databaseโ21Updated last year
- Code Hierarchy Exploration Net (chen)โ19Updated 2 weeks ago
- Mayhem example templates for programming languages and fuzzers that you love!โ28Updated last year
- โ23Updated last month
- SARIF Explorer: A VSCode extension that helps you visualize and triage static analysis resultsโ22Updated 2 months ago
- Scapy hands-onโ34Updated last year
- ๐งช Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.โ39Updated 3 months ago
- Toolkit for creating cryptographic figures and videos.โ32Updated 10 months ago
- โ32Updated 2 years ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2โ62Updated 2 weeks ago
- PASTIS: Collaborative Fuzzing Frameworkโ162Updated 7 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. Tโฆโ44Updated 4 months ago
- Userland exec PoC to be used as attack vector techniqueโ82Updated last month
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.โ46Updated 4 months ago
- Damn Vulenerable Kernel Module for kernel fuzzingโ58Updated 5 months ago
- Resources for Browser Security Researchโ37Updated 2 years ago
- A tool for firmware cartographyโ146Updated 3 months ago