Your S2E project management tools. Visit https://s2e.systems/docs to get started.
☆96Feb 5, 2026Updated 3 weeks ago
Alternatives and similar repositories for s2e-env
Users that are interested in s2e-env are comparing it to the libraries listed below
Sorting:
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- S2E Core Engine Library☆15Jan 7, 2020Updated 6 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆512Feb 15, 2026Updated 2 weeks ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Jan 2, 2020Updated 6 years ago
- Tiny Code Generator Library☆46Jan 16, 2021Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- ☆386Oct 28, 2019Updated 6 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74May 24, 2019Updated 6 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- ☆44Jun 17, 2020Updated 5 years ago
- radare2 + miasm2 = ♥☆103Jan 22, 2020Updated 6 years ago
- TEMU: The BitBlaze Dynamic Analysis Component (with some patches).☆65Jan 25, 2015Updated 11 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Python core of avatar²☆566Mar 31, 2025Updated 11 months ago
- Symbolic execution for LLVM traces produced by PANDA☆40Feb 5, 2019Updated 7 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆315Jun 25, 2020Updated 5 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- KLEE's version of uClibc☆56May 31, 2024Updated last year
- DARPA Cyber Grand Challenge OS syscall library☆18Feb 1, 2017Updated 9 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Sep 5, 2017Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- x86 Dynamic Binary Translator Library☆34Dec 19, 2020Updated 5 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago