zardus / cgc-binsLinks
Compiled CGC binaries for experimentation porpoises.
☆22Updated 7 years ago
Alternatives and similar repositories for cgc-bins
Users that are interested in cgc-bins are comparing it to the libraries listed below
Sorting:
- source code for savior fuzzer☆127Updated 4 years ago
- Utilities for generating dynamic traces☆92Updated 3 months ago
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- ☆90Updated 3 years ago
- ☆98Updated 4 years ago
- Inferred Model-based Fuzzer☆111Updated 3 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- ☆65Updated 8 years ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- ☆72Updated 2 years ago
- ☆144Updated 8 months ago
- angr's exploration technique to perform taint analysis☆63Updated 5 years ago
- ☆66Updated 4 years ago
- List the real world programs evaluated in fuzzing papers.☆56Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆178Updated last year
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago
- ☆51Updated this week
- ☆66Updated 5 years ago
- Produce code coverage results with gcov from afl-fuzz test cases☆84Updated 6 months ago
- A set of programs used for benchmarking the strength of obfuscation☆90Updated 7 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆34Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆47Updated 8 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago