vs-uulm / nemesysView external linksLinks
NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)
☆58Jun 18, 2024Updated last year
Alternatives and similar repositories for nemesys
Users that are interested in nemesys are comparing it to the libraries listed below
Sorting:
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆73Jul 25, 2024Updated last year
- Re-implementation of the protocol reverse engineering approach FieldHunter☆17Oct 17, 2022Updated 3 years ago
- ☆37May 2, 2023Updated 2 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆181May 22, 2024Updated last year
- Protocol Inspection and State Machine Analysis☆23May 26, 2018Updated 7 years ago
- This is an industrial dataset contains eight different types of ICS protocols, mainly collected for the evaluation of protocol reverse en…☆16Jan 7, 2024Updated 2 years ago
- “Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "…☆51Apr 7, 2018Updated 7 years ago
- Netzob: Protocol Reverse Engineering, Modeling and Fuzzing☆822Apr 18, 2024Updated last year
- Patches to the Protocol Informatics project to make it work with a numpy.☆19May 4, 2012Updated 13 years ago
- Protocol Learning and Stateful Fuzzing☆355Jun 7, 2022Updated 3 years ago
- A protocol reverse engineering tool for industrial binary protocol based on pin tool☆17Oct 22, 2020Updated 5 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated last month
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- ☆36Oct 25, 2024Updated last year
- ☆13Oct 1, 2020Updated 5 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Jul 19, 2021Updated 4 years ago
- ☆16Mar 23, 2018Updated 7 years ago
- ☆17Mar 2, 2018Updated 7 years ago
- lxfuzz is a grey-box kernel fuzzer used for linux. it is scalable because of qemu being used to emulate in a way to be able to freely cho…☆22Jul 21, 2024Updated last year
- Examples demonstrating the usage of avatar²☆28Dec 9, 2023Updated 2 years ago
- Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework☆23Jan 27, 2021Updated 5 years ago
- Reverse engineering tool using bioinformatics sequence alignment algorithms☆26Mar 5, 2021Updated 4 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Take a QEMU binary, copy the dependencies into a chroot☆11Oct 5, 2022Updated 3 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Nov 27, 2021Updated 4 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Feb 3, 2026Updated last week
- ☆13Mar 22, 2024Updated last year
- AFL++ with support for FormatFuzzer☆18May 28, 2025Updated 8 months ago
- Exploits for various CVEs☆11Mar 19, 2022Updated 3 years ago
- Dockerfile for peach pro with everything set up as needed☆26Jun 29, 2024Updated last year
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 4 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆13Jan 30, 2023Updated 3 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- Fuzz-introspector has moved (but is actively maintained) - please follow the project here https://github.com/ossf/fuzz-introspector☆14Dec 3, 2021Updated 4 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 5 years ago
- kAFL Fuzzer☆34Mar 12, 2025Updated 11 months ago
- Library to wrap all file calls when fuzzing with AFL++☆51Feb 3, 2023Updated 3 years ago