Code for my blog post on using S2E for malware analysis
☆25Jul 16, 2019Updated 6 years ago
Alternatives and similar repositories for malware-s2e
Users that are interested in malware-s2e are comparing it to the libraries listed below
Sorting:
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- An approximate solver for concolic execution☆22Apr 29, 2025Updated 10 months ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- Security benchmarks for the Internet of Things☆22Nov 11, 2020Updated 5 years ago
- ☆53Nov 26, 2017Updated 8 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- A modified fork of Be.HexEditor for use in debug tools☆15Jan 5, 2022Updated 4 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- CRETE under development☆60Jun 30, 2020Updated 5 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Apr 7, 2019Updated 6 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆14Sep 17, 2019Updated 6 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- GraphFuzz is an experimental framework for building structure-aware, library API fuzzers.☆10Apr 21, 2022Updated 3 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 8 months ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Feb 22, 2019Updated 7 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- PoC exploits against various SGX enclaves☆14May 19, 2022Updated 3 years ago