yannicnoller / hydiffLinks
☆25Updated 4 years ago
Alternatives and similar repositories for hydiff
Users that are interested in hydiff are comparing it to the libraries listed below
Sorting:
- KLEE / CSE Project☆47Updated 5 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- MemLock: Memory Usage Guided Fuzzing☆32Updated 5 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- AFL enhanced for concurrency bug and vulnerabilities☆19Updated 5 years ago
- Source code of MEUZZ fuzzer☆46Updated 4 years ago
- ☆53Updated 8 years ago
- AFLTeam Collaborative Parallel Fuzzing☆75Updated 3 years ago
- Fuzzing with controlled compilation☆31Updated 2 years ago
- ☆39Updated 4 years ago
- ☆41Updated 6 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Updated 5 years ago
- List the real world programs evaluated in fuzzing papers.☆56Updated 6 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- ☆14Updated 8 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Updated 2 years ago
- A data dependence analyzer for C program☆20Updated 3 years ago
- git://g.csail.mit.edu/kint☆51Updated 12 years ago
- ☆34Updated 4 years ago
- ☆12Updated 4 years ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆124Updated 4 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- ☆42Updated 3 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Updated 4 years ago
- The parser-directed Fuzzer☆40Updated 5 years ago
- An interactive tool for better understanding and intervening fuzzing process via real-time visualization.☆80Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 11 months ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year