wolever / Protocol-Informatics
Patches to the Protocol Informatics project to make it work with a numpy.
☆20Updated 12 years ago
Related projects ⓘ
Alternatives and complementary repositories for Protocol-Informatics
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 4 years ago
- ☆44Updated 2 years ago
- Source-binary patch presence test system.☆81Updated 2 years ago
- SmartSeed☆10Updated 6 years ago
- implementing collafl☆25Updated 4 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆41Updated 2 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆33Updated 11 months ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆58Updated 3 months ago
- DiAne is a smart fuzzer for IoT devices☆39Updated 7 months ago
- Code for PathAFL on ASIACCS 2020. Please see README_CN.md. Please wait for README_EN.md.☆16Updated 3 years ago
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year
- ☆91Updated last year
- ☆67Updated 4 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- ☆79Updated 6 years ago
- ☆50Updated 3 years ago
- ☆50Updated 6 years ago
- ☆104Updated 9 months ago
- Source code of MEUZZ fuzzer☆43Updated 2 years ago
- ☆46Updated 2 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆83Updated 4 years ago
- Run fuzzing experiments in Docker☆30Updated 3 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆20Updated 7 months ago
- ☆14Updated 2 years ago
- ☆44Updated 4 years ago
- ☆38Updated last year
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆102Updated 5 years ago
- User Guided API Misuse Detection☆27Updated last year
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆21Updated 4 years ago