zjuArclab / CPscanLinks
☆16Updated 4 years ago
Alternatives and similar repositories for CPscan
Users that are interested in CPscan are comparing it to the libraries listed below
Sorting:
- DiAne is a smart fuzzer for IoT devices☆42Updated last year
- Source-binary patch presence test system.☆84Updated 3 years ago
- Run fuzzing experiments in Docker☆32Updated 4 years ago
- ☆56Updated last year
- ☆97Updated last year
- ☆81Updated 4 years ago
- AFLNW: network wrapper for AFL☆46Updated last year
- implementing collafl☆26Updated 5 years ago
- ☆43Updated 2 years ago
- cinspector - a static C source code analysis framework☆28Updated last year
- a blackbox network fuzzer for IoT devices☆55Updated last year
- ☆30Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Updated 2 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Updated 2 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 4 years ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- ☆52Updated 5 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 3 years ago
- 记录自己在看 afl 源码时候的一些笔记和想法,还有一些自己觉得有意思的魔改。2020年12月2日update:添加混合模糊测试目录☆110Updated 4 years ago
- ☆70Updated last year
- ☆61Updated 3 years ago
- Run fuzzing experiments in Docker☆101Updated 4 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- Automatic Exploit Generation Paper☆89Updated 3 years ago
- ☆15Updated 4 years ago
- ☆46Updated 4 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆97Updated last week
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆46Updated 2 years ago
- A GPT-Based Fuzz Driver Generator☆48Updated 2 years ago