Documentation and Quick Start Guides for the S2E Symbolic Execution Platform
☆76Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below
Sorting:
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Feb 5, 2026Updated last month
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Jun 13, 2022Updated 3 years ago
- Any useful windbg plugins I've written.☆117Apr 10, 2018Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- ☆387Oct 28, 2019Updated 6 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- Experimental translation of llvm to smt.☆59Apr 8, 2020Updated 5 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- Dump Kext information from Macos. Support batch analysis. The disassembly framework used is Capstone☆43Jul 16, 2017Updated 8 years ago
- The third MOSEC mobile security technology summit 第三届 MOSEC 移动安全技术峰会参会分享☆186Jul 7, 2017Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆304Jan 12, 2023Updated 3 years ago
- An XNU kernel fuzz tool☆22Mar 3, 2010Updated 16 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- Synesthesia, implemented as Yices scripts☆94Jul 17, 2017Updated 8 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- A precise and scalable pointer analysis for LLVM, written in Ascent☆68Mar 1, 2025Updated last year
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Jan 17, 2017Updated 9 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Nov 19, 2017Updated 8 years ago
- Deprecated repo for PANDA 1.0 – see PANDA 2.0 repository☆107Dec 17, 2016Updated 9 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- S2E Core Engine Library☆15Jan 7, 2020Updated 6 years ago
- Content from presentation at BHUSA 2017☆180Jul 27, 2017Updated 8 years ago