Your S2E project management tools. Visit https://s2e.systems/docs to get started.
☆96Feb 5, 2026Updated last month
Alternatives and similar repositories for s2e-env
Users that are interested in s2e-env are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- S2E Core Engine Library☆15Jan 7, 2020Updated 6 years ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆513Updated this week
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Jan 2, 2020Updated 6 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- ☆387Oct 28, 2019Updated 6 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Feb 5, 2019Updated 7 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- Tiny Code Generator Library☆46Jan 16, 2021Updated 5 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆315Jun 25, 2020Updated 5 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74May 24, 2019Updated 6 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- TEMU: The BitBlaze Dynamic Analysis Component (with some patches).☆65Jan 25, 2015Updated 11 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- ☆44Jun 17, 2020Updated 5 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- Python core of avatar²☆569Mar 31, 2025Updated 11 months ago
- ☆17Sep 23, 2024Updated last year
- KLEE's version of uClibc☆56May 31, 2024Updated last year
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆283Jul 22, 2020Updated 5 years ago
- Hydra: an Extensible Fuzzing Framework for Finding Semantic Bugs in File Systems☆173Aug 8, 2022Updated 3 years ago
- Driller: augmenting AFL with symbolic execution!☆965Mar 24, 2025Updated last year
- A curated list of awesome symbolic execution resources including essential research papers, lectures, videos, and tools.☆1,476Mar 14, 2026Updated last week
- radare2 + miasm2 = ♥☆103Jan 22, 2020Updated 6 years ago
- Binary Analysis Platform☆2,217Apr 30, 2025Updated 10 months ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Sep 5, 2017Updated 8 years ago
- SymCC: efficient compiler-based symbolic execution☆862Mar 16, 2026Updated last week