QGrain/SyzGPT

[ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG

44
/ 100
Emerging

This tool helps security researchers and kernel developers uncover vulnerabilities in the Linux kernel. It takes a corpus of existing system call programs and, using an AI model, generates new, effective test cases for system calls that are rarely exercised. The output is a set of specialized test programs that can improve code coverage and find bugs that are difficult to detect with traditional fuzzing methods.

Use this if you are performing kernel security research or development and need to generate more effective test cases for low-frequency system calls to find elusive bugs and improve code coverage.

Not ideal if you are a general software developer or penetration tester not focused on Linux kernel security or deep system call fuzzing.

kernel-security fuzzing vulnerability-research system-calls linux-kernel-development
No Package No Dependents
Maintenance 10 / 25
Adoption 8 / 25
Maturity 16 / 25
Community 10 / 25

How are scores calculated?

Stars

52

Forks

5

Language

Python

License

Apache-2.0

Last pushed

Jan 29, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/llm-tools/QGrain/SyzGPT"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.