Documentation and Quick Start Guides for the S2E Symbolic Execution Platform
☆76Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below
Sorting:
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Feb 5, 2026Updated 3 weeks ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Jun 13, 2022Updated 3 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Any useful windbg plugins I've written.☆117Apr 10, 2018Updated 7 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 4 months ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆94Jul 17, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- ☆386Oct 28, 2019Updated 6 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Nov 19, 2017Updated 8 years ago
- Dump Kext information from Macos. Support batch analysis. The disassembly framework used is Capstone☆43Jul 16, 2017Updated 8 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- The third MOSEC mobile security technology summit 第三届 MOSEC 移动安全技术峰会参会分享☆186Jul 7, 2017Updated 8 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"☆316Jun 11, 2020Updated 5 years ago
- Content from presentation at BHUSA 2017☆180Jul 27, 2017Updated 8 years ago
- dex文件解析工具☆50Feb 6, 2017Updated 9 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- ☆21May 8, 2015Updated 10 years ago
- # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS…☆53Jul 5, 2017Updated 8 years ago
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- An XNU kernel fuzz tool☆22Mar 3, 2010Updated 15 years ago