waugustus / CarpetFuzz-fuzzerLinks
CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.
☆14Updated last year
Alternatives and similar repositories for CarpetFuzz-fuzzer
Users that are interested in CarpetFuzz-fuzzer are comparing it to the libraries listed below
Sorting:
- ☆36Updated last year
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆36Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 3 years ago
- ☆29Updated 3 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- Symbolic Execution Over Processor Traces☆122Updated last year
- ☆25Updated last year
- ☆18Updated 2 years ago
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- ☆43Updated 3 months ago
- A data-flow-guided fuzzer☆123Updated 2 years ago
- Coverage-guided Fuzzing as Online Stochastic Control☆54Updated 10 months ago
- ☆55Updated last year
- ☆10Updated 2 years ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- a browser fuzzer☆40Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated 2 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆23Updated 3 years ago
- AFLTeam Collaborative Parallel Fuzzing☆74Updated 3 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆34Updated 2 weeks ago
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Updated 2 years ago
- ☆34Updated 3 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆89Updated 3 years ago
- An Automated Heap Feng Shui Tool☆17Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆31Updated 3 years ago
- ☆35Updated 3 years ago
- A list of data-only attacks☆19Updated 3 weeks ago
- ☆16Updated last year