tunz / baeumLinks
Evolutionary Fuzzer written in Rust
☆23Updated 8 years ago
Alternatives and similar repositories for baeum
Users that are interested in baeum are comparing it to the libraries listed below
Sorting:
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Updated 7 years ago
- ☆51Updated 7 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆223Updated 6 months ago
- ☆52Updated 4 years ago
- ☆65Updated 4 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- ☆13Updated 9 years ago
- ☆81Updated 8 years ago
- ☆96Updated 6 years ago
- Mozilla fork of the American Fuzzy Lop repo☆47Updated 6 years ago
- ctf exploit codes or writeups☆160Updated last year
- ☆55Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Updated 3 years ago
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- The Harvest of V8 regress.☆137Updated 5 years ago
- Distributed Fuzzing for afl☆72Updated 10 years ago
- a grammar based feedback fuzzer☆165Updated 2 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- ctfs write-up☆30Updated 2 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Updated 7 years ago
- ☆40Updated 8 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 6 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 6 years ago
- Exploit for hardcore pwnable☆35Updated 6 years ago
- Lazy python wrapper of KLEE for solving CTF challenges☆64Updated 5 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Updated 4 years ago
- Inferred Model-based Fuzzer☆111Updated 3 years ago
- My solutions for CTF & wargame challenges☆88Updated last year
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago