tum-i4 / munchLinks
Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs
☆38Updated 6 years ago
Alternatives and similar repositories for munch
Users that are interested in munch are comparing it to the libraries listed below
Sorting:
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- KLEE / CSE Project☆46Updated 5 years ago
- Fuzzing with controlled compilation☆30Updated 2 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Concolic Execution Fuzzer☆24Updated 4 years ago
- CRETE under development☆59Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- ☆54Updated 6 years ago
- Challenging testcases for fuzzers☆72Updated last year
- ☆96Updated 6 years ago
- ☆16Updated 7 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Fuzzing Parsers with Tokens☆33Updated 4 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆74Updated 3 years ago
- AFLTeam Collaborative Parallel Fuzzing☆74Updated 3 years ago
- The parser-directed Fuzzer☆39Updated 5 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- ☆54Updated 7 years ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆124Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90Updated last year
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆95Updated last month
- Gives tainting information for the provided bitcode file generated from binary.☆44Updated 8 years ago
- ☆25Updated 4 years ago
- ☆24Updated 7 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- ☆73Updated 5 years ago