adrianherrera / kaitai-s2eLinks
Code for my blog post on combining S2E and Kaitai Struct
☆15Updated 6 years ago
Alternatives and similar repositories for kaitai-s2e
Users that are interested in kaitai-s2e are comparing it to the libraries listed below
Sorting:
- Python concolic execution framework for program analysis☆67Updated 10 years ago
- ☆16Updated 8 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆17Updated 9 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 8 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- ☆63Updated 9 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- ☆65Updated 4 years ago
- ☆90Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 6 years ago
- ☆105Updated 10 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago
- ☆19Updated 5 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆35Updated 7 years ago
- ☆28Updated 3 years ago
- ☆34Updated 8 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Updated 8 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Updated 10 years ago
- Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )☆41Updated 5 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- Some low-level stuff☆107Updated last year
- ☆26Updated 9 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago