vanhauser-thc / afl-dynamorioView external linksLinks
run AFL with dynamorio
☆37Aug 24, 2020Updated 5 years ago
Alternatives and similar repositories for afl-dynamorio
Users that are interested in afl-dynamorio are comparing it to the libraries listed below
Sorting:
- run AFL with pintool☆66Feb 24, 2020Updated 5 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75May 21, 2021Updated 4 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- Very WIP taint analysis for DynamoRIO (ARM)☆20Apr 10, 2018Updated 7 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Feb 17, 2020Updated 5 years ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Nov 27, 2021Updated 4 years ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Dec 20, 2024Updated last year
- ☆95Apr 2, 2019Updated 6 years ago
- Library to wrap all file calls when fuzzing with AFL++☆51Feb 3, 2023Updated 3 years ago
- Patches to afl to fix bugs or add enhancements☆81Sep 10, 2019Updated 6 years ago
- haze binary fuzzer☆56May 19, 2024Updated last year
- Safe Rust bindings to the DynamoRIO dynamic binary instrumentation framework.☆21Mar 8, 2025Updated 11 months ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- ☆41Aug 4, 2020Updated 5 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- A simple /proc/<pid>/{mem,maps} library for Rust☆11May 28, 2022Updated 3 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- My scripts for Ghidra.☆25Oct 9, 2025Updated 4 months ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28May 19, 2018Updated 7 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆178Mar 29, 2022Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Jul 14, 2022Updated 3 years ago
- Sensitive and Collaborative Fuzzing with AFL☆27Jul 29, 2019Updated 6 years ago
- a few Ghidra scripts for dumping PCode data☆50May 21, 2019Updated 6 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Apr 24, 2016Updated 9 years ago
- Fuzzing Lua runtimes without pain☆11Updated this week
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Repo for fuzzing projects☆46Jun 18, 2020Updated 5 years ago
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 4 years ago
- VSCode Ghidra Plugin/Script Skeletons☆30Aug 1, 2020Updated 5 years ago
- A new XNU kernel fuzzer with some extra features.☆13Feb 8, 2017Updated 9 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- A very simple coverage highlighter for VIM☆12Dec 2, 2020Updated 5 years ago
- ☆11Feb 25, 2023Updated 2 years ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆350Jul 30, 2024Updated last year