S2E / guest-imagesView external linksLinks
Scripts to automatically create VM images
☆15Oct 4, 2025Updated 4 months ago
Alternatives and similar repositories for guest-images
Users that are interested in guest-images are comparing it to the libraries listed below
Sorting:
- Scripts for creating VM images for my courses on software engineering and testing.☆36Mar 28, 2023Updated 2 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Feb 5, 2026Updated last week
- Java Ranger is a path-merging extension of Symbolic PathFinder☆15Jan 24, 2026Updated 3 weeks ago
- bitshred research project code.☆14Feb 12, 2016Updated 10 years ago
- Samples of Avatar firmware analysis (including NDSS'14 cases)☆20Jun 27, 2017Updated 8 years ago
- Virtual Inheritance Reverse Engineering☆18Aug 20, 2020Updated 5 years ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 5 years ago
- ☆21Jan 10, 2019Updated 7 years ago
- Fast Binary Translator for the Kernel☆28Sep 23, 2013Updated 12 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Mar 30, 2020Updated 5 years ago
- NCTU Operation System Design and Implementation☆27Jun 6, 2020Updated 5 years ago
- Linux io_uring based c++ 20 coroutine library☆28Jun 21, 2022Updated 3 years ago
- Hsuan-Fuzz: REST API Fuzzing by Coverage Level Guided Blackbox Testing☆29May 14, 2022Updated 3 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Jan 2, 2020Updated 6 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Jun 13, 2022Updated 3 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆33Feb 15, 2022Updated 4 years ago
- ☆26Nov 15, 2021Updated 4 years ago
- A python interface to joern (deprecated).☆34Nov 13, 2018Updated 7 years ago
- In this GitHub repository, we will demonstrate how to utilize MongoDB to build an automated underwriting process to calculate a customize…☆11Jan 31, 2026Updated 2 weeks ago
- Source-binary patch presence test system.☆84Jun 23, 2022Updated 3 years ago
- Alcatel-Lucent SR/OS (TiMOS) Firmware Packer☆11May 31, 2017Updated 8 years ago
- 計算機結構 -- Nand2tetris Part I (金門大學 / 資訊工程系 106 上學期 )☆12Dec 21, 2017Updated 8 years ago
- CCG is a random C Code Generator☆44Sep 11, 2022Updated 3 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- A risc-v simulator based on SystrmC☆14Jan 7, 2022Updated 4 years ago
- Course Projects for Stanford CS142 Web Applications☆10Oct 15, 2016Updated 9 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Oct 4, 2019Updated 6 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- A Z3-Based String Constraint Solver☆87Jan 1, 2020Updated 6 years ago
- A tool for learning bug patterns.☆11Jul 19, 2016Updated 9 years ago
- ☆12Apr 3, 2020Updated 5 years ago
- ☆11Apr 27, 2020Updated 5 years ago
- ☆10Feb 23, 2024Updated last year