This is the archived S2E 1.0 repo. We do not maintain it anymore.
☆315Jun 25, 2020Updated 5 years ago
Alternatives and similar repositories for s2e-old
Users that are interested in s2e-old are comparing it to the libraries listed below
Sorting:
- FuzzBALL: Vine-based Binary Symbolic Execution☆215Aug 15, 2025Updated 6 months ago
- Path based Dynamic Analysis☆118Mar 25, 2017Updated 8 years ago
- A bibliography of papers related to symbolic execution☆291Aug 12, 2016Updated 9 years ago
- Run android with S2E☆31Dec 11, 2014Updated 11 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- Driller: augmenting AFL with symbolic execution!☆965Mar 24, 2025Updated 11 months ago
- ☆236May 31, 2018Updated 7 years ago
- An amd64 symbolic emulator☆314Aug 28, 2021Updated 4 years ago
- Platform for Architecture-Neutral Dynamic Analysis☆2,719Feb 14, 2026Updated 2 weeks ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,070Dec 2, 2025Updated 3 months ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- Binary Analysis Platform☆2,214Apr 30, 2025Updated 10 months ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- ☆105Apr 20, 2015Updated 10 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Release Branches for MoFlow☆307Nov 10, 2015Updated 10 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- ☆386Oct 28, 2019Updated 6 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,612Jun 11, 2025Updated 8 months ago
- dynamic binary analysis via platform emulation☆904Jun 1, 2023Updated 2 years ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆837Nov 19, 2024Updated last year
- BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework☆1,445Nov 24, 2019Updated 6 years ago
- Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode☆2,751Apr 26, 2022Updated 3 years ago
- The Jakstab static analysis platform for binaries☆163Dec 10, 2019Updated 6 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆324Aug 12, 2019Updated 6 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Jul 14, 2020Updated 5 years ago
- A decompiler with multiple backend support, written in Python. Works with IDA and Capstone.☆532Jan 28, 2016Updated 10 years ago
- KLEE Symbolic Execution Engine☆2,903Feb 21, 2026Updated last week
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Jan 17, 2017Updated 9 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Dec 1, 2017Updated 8 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- Linux hooking engine for ARM architecture☆16May 4, 2015Updated 10 years ago
- Reverse engineering framework in Python☆3,828Jan 26, 2025Updated last year