vanhauser-thc / afl-dyninstLinks
American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries
☆74Updated 4 years ago
Alternatives and similar repositories for afl-dyninst
Users that are interested in afl-dyninst are comparing it to the libraries listed below
Sorting:
- run AFL with pintool☆66Updated 5 years ago
- ☆63Updated 6 years ago
- Patches to afl to fix bugs or add enhancements☆81Updated 5 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Library to wrap all file calls when fuzzing with AFL++☆50Updated 2 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Updated 3 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- ☆96Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 5 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- A pip wrapper around AFL.☆88Updated 4 years ago
- Source code for building an exploitable linux kernel challenge iso.☆46Updated 11 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- ☆65Updated 4 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- ☆47Updated 5 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆39Updated 8 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆102Updated last year
- Test case minimizer for afl-fuzz☆26Updated 8 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆210Updated 3 years ago