ElNiak / awesome-formal-verification
Welcome to the ultimate list of resources for formal verification techniques and tools. This repository aims to provide an organized collection of high-quality resources to help professionals, researchers, and enthusiasts stay updated and advance their knowledge in the field.
☆20Updated last week
Alternatives and similar repositories for awesome-formal-verification:
Users that are interested in awesome-formal-verification are comparing it to the libraries listed below
- Snippets, scripts, config files☆16Updated last month
- The public release of LeftoverLocals code☆65Updated last year
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆13Updated last year
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆18Updated 6 months ago
- ModelHunter is a powerful pipeline designed to extract machine learning models from Android applications.☆19Updated 9 months ago
- Dynamically discover the commands used to create a piece of software☆47Updated 2 months ago
- DARPA's Cyber Assured Systems Engineering (CASE) project named Verification Evidence and Resilient Design in Anticipation of Cybersecurit…☆41Updated 5 months ago
- Binary analysis in HOL☆35Updated this week
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆13Updated 2 months ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆105Updated 2 months ago
- Interactive visualizer for e-graphs☆20Updated last month
- Program Analysis, Software Verification & Testing. Python3, CAS, Dafny, Z3, CVC4, UCLID, ZChaff, NuSMV, AFL, Scala, CBMC & LLVM Framework…☆37Updated last year
- Tutorials and courses for Z3☆71Updated last month
- The axiom profiler for exploring and visualizing SMT solver quantifier instantiations (made via E-matching).☆32Updated 2 weeks ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆41Updated 2 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆18Updated 4 months ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆10Updated this week
- 🐝 Ransomware Detection using Machine Learning with eBPF for Linux.☆58Updated 2 months ago
- ☆17Updated 4 months ago
- Unicorn: Symbolic Execution, Bounded Model Checking, and Code Optimization of RISC-V Code using Classical Solvers and Quantum Computers☆33Updated this week
- An curated list of papers on program synthesis.☆68Updated 5 years ago
- ☆23Updated 3 years ago
- gradient-based symbolic execution engine implemented from scratch☆35Updated last year
- Genetic program repair using GHC☆30Updated 8 months ago
- A library to facilitate the static analysis of Android apps☆12Updated 5 months ago
- System for verifying the correctness of generated Copilot programs☆14Updated last week
- Quantum circuits compiler with staging and continuations☆15Updated 2 months ago
- ⚙️ A curated list of static analysis (SAST) tools for all programming languages, config files, build tools, and more. With repository sta…☆17Updated this week
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆23Updated 9 months ago
- A high-performance, parallel, compilation-based symbolic execution engine☆127Updated this week