vusec / einsteinLinks
Practical Data-Only Attack Generation
☆41Updated last year
Alternatives and similar repositories for einstein
Users that are interested in einstein are comparing it to the libraries listed below
Sorting:
- ☆25Updated 2 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆29Updated last year
- A list of data-only attacks☆19Updated 2 months ago
- Coverage-guided Fuzzing as Online Stochastic Control☆54Updated 9 months ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆91Updated 3 years ago
- ☆38Updated 2 years ago
- ☆75Updated 2 years ago
- A coverage-based software testing tool☆34Updated 4 years ago
- ☆51Updated last month
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆31Updated 3 years ago
- AFLTeam Collaborative Parallel Fuzzing☆74Updated 2 years ago
- ☆32Updated 3 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆70Updated 11 months ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆81Updated 2 weeks ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆23Updated 3 years ago
- ☆134Updated last year
- Symbolic Execution Over Processor Traces☆122Updated last year
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Updated 2 years ago
- ☆43Updated 3 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆36Updated 9 months ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- ☆19Updated 2 years ago
- ☆14Updated 3 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 2 years ago
- ☆14Updated 6 months ago
- ☆19Updated 2 months ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 2 years ago
- ☆25Updated last year