S2E / s2eLinks
S2E: A platform for multi-path program analysis with selective symbolic execution.
☆480Updated 7 months ago
Alternatives and similar repositories for s2e
Users that are interested in s2e are comparing it to the libraries listed below
Sorting:
- SymQEMU: Compilation-based symbolic execution for binaries☆349Updated 2 months ago
- SymCC: efficient compiler-based symbolic execution☆824Updated 2 months ago
- The fastest Intel-PT decoder for fuzzing☆372Updated last year
- A fuzzer for full VM kernel/driver targets☆722Updated this week
- Intermediate Representation for Binary analysis and transformation☆341Updated this week
- An awesome & curated list of binary rewriting papers☆245Updated 3 years ago
- An LLVM-based instrumentation tool for universal taint tracking, dataflow analysis, and tracing.☆572Updated 3 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆260Updated 4 months ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆717Updated 2 months ago
- A LLVM Sanitizer for Symbolic Tracing☆223Updated this week
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆287Updated 6 years ago
- A grammar-based custom mutator for AFL++☆254Updated last year
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆645Updated 2 years ago
- ☆388Updated 3 years ago
- A fast and accurate disassembler☆708Updated this week
- A powerful static binary rewriting tool☆1,033Updated 2 months ago
- ☆144Updated 8 months ago
- A ground-truth fuzzing benchmark suite based on real programs with real bugs.☆314Updated last month
- anvill forges beautiful LLVM bitcode out of raw machine code☆352Updated 10 months ago
- Python bindings for Valgrind's VEX IR.☆359Updated this week
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆344Updated 11 months ago
- ☆306Updated 3 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆260Updated last month
- Kernel fuzzer inspired by Syzkaller.☆280Updated 3 years ago
- Directed Greybox Fuzzing with AFL☆533Updated last year
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆229Updated 3 years ago
- Recent symbolic execution papers and tools.☆169Updated last month
- LAVA: Large-scale Automated Vulnerability Addition☆404Updated 2 weeks ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆581Updated 6 years ago