tunz / baeumLinks
Evolutionary Fuzzer written in Rust
☆23Updated 7 years ago
Alternatives and similar repositories for baeum
Users that are interested in baeum are comparing it to the libraries listed below
Sorting:
- ☆96Updated 6 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- ☆13Updated 8 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆217Updated last month
- ☆51Updated 3 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago
- ctfs write-up☆30Updated 2 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- ctf exploit codes or writeups☆157Updated 8 months ago
- ☆82Updated 8 years ago
- Exploit for hardcore pwnable☆35Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆102Updated 5 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Updated 9 years ago
- Inferred Model-based Fuzzer☆111Updated 3 years ago
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- ☆51Updated 7 years ago
- My solutions for CTF & wargame challenges☆89Updated last year
- a grammar based feedback fuzzer☆165Updated 2 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- afl-fuzz for javascript☆205Updated 8 years ago
- ☆55Updated 5 years ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆123Updated 4 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 4 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 7 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- Patches to afl to fix bugs or add enhancements☆81Updated 5 years ago
- ☆65Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆156Updated 4 years ago
- ☆59Updated 4 years ago