uni-due-syssec / sgxfuzzLinks
☆21Updated 3 years ago
Alternatives and similar repositories for sgxfuzz
Users that are interested in sgxfuzz are comparing it to the libraries listed below
Sorting:
- A fuzzer setup to fuzz libc functions.☆16Updated 3 years ago
- ☆39Updated 3 years ago
- ☆22Updated 11 months ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Updated last year
- ☆14Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- Practical Data-Only Attack Generation☆44Updated last year
- ☆26Updated 3 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- ☆17Updated 6 years ago
- Linux kernel branches for confidential compute research☆20Updated 10 months ago
- Library for manipulating gdb in batch mode☆21Updated last year
- Evolving fuzzers with large language models☆17Updated 2 years ago
- Paper and implementation of "SAND: Decoupling Sanitization from Fuzzing for Low Overhead"☆26Updated 11 months ago
- ☆45Updated 3 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆30Updated last year
- a friendly implementation of nyx ontop of firecracker instead of QEMU. Easier to use & cleaner code☆25Updated 3 weeks ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 3 years ago
- ☆49Updated 7 months ago
- Side-channel Analysis☆19Updated 3 years ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆74Updated 8 months ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16Updated 2 years ago
- ROSA: Finding Backdoors with Fuzzing☆40Updated 7 months ago
- kAFL Fuzzer☆34Updated 10 months ago
- An example fuzzer about how to fuzz a JS engine combinign Nautilus with Token-level fuzzing☆47Updated last year
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Updated 3 years ago
- ☆91Updated 10 months ago
- A list of data-only attacks☆20Updated 5 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated last year
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Updated 3 years ago