tum-i4 / munch
Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs
☆38Updated 6 years ago
Alternatives and similar repositories for munch:
Users that are interested in munch are comparing it to the libraries listed below
- KLEE / CSE Project☆44Updated 4 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 6 years ago
- CRETE under development☆59Updated 4 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Fuzzing Parsers with Tokens☆32Updated 4 years ago
- ☆25Updated 6 years ago
- ☆53Updated 5 years ago
- AFLTeam Collaborative Parallel Fuzzing☆73Updated 2 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆66Updated 3 years ago
- A monitoring script for AFL☆39Updated 8 years ago
- ☆11Updated 3 years ago
- Signedness-Agnostic Strided-Interval☆35Updated 5 years ago
- ☆96Updated 5 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- experiments for IJON☆12Updated 5 years ago
- Tutorial to write qemu plugins☆31Updated 7 years ago
- Modular And Compositional analysis with KLEE Engine☆115Updated 5 years ago
- Get actually nice HTML coverage overview on libfuzzer runs☆29Updated last year
- Fuzzing with controlled compilation☆27Updated last year
- Superion Mutator for AFLPlusPlus☆32Updated last year
- ☆53Updated 7 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- OSS-Fuzz - integrated with AFLGo for Patch Testing☆35Updated 7 years ago
- Repository for understanding and writing LLVM passes.☆31Updated 5 years ago
- Tool for detecting error handling bugs☆22Updated 8 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆92Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago