add network fuzzers, and a taint analysis framework

This commit is contained in:
Dobin Rutishauser 2018-05-04 08:11:04 +02:00
parent 7eabd06a72
commit 54132edee7

View File

@ -260,6 +260,12 @@ https://www.corelan.be/index.php/2013/02/26/root-cause-analysis-memory-corruptio
[rage_fuzzer](https://github.com/deanjerkovich/rage_fuzzer) - A dumb protocol-unaware packet fuzzer/replayer.
[Fuzzotron](https://github.com/denandz/fuzzotron) - A simple network fuzzer supporting TCP, UDP and multithreading.
[Mutiny](https://github.com/Cisco-Talos/mutiny-fuzzer) - The Mutiny Fuzzing Framework is a network fuzzer that operates by replaying PCAPs through a mutational fuzzer.
[Fuzzing For Worms](https://github.com/dobin/ffw) - A fuzzing framework for network servers.
### Misc
*Other notable fuzzers like Kernel Fuzzers, general purpose fuzzer etc.,*
@ -291,6 +297,8 @@ https://www.corelan.be/index.php/2013/02/26/root-cause-analysis-memory-corruptio
[kfetch-toolkit](https://github.com/j00ru/kfetch-toolkit) - Tool to perform advanced logging of memory references performed by operating systems kernels
[moflow](https://github.com/vrtadmin/moflow) - A software security framework containing tools for vulnerability, discovery, and triage.
### Symbolic Execution SAT and SMT Solvers
[Z3](https://github.com/Z3Prover/z3) - A theorem prover from Microsoft Research.