FuzzBALL: Vine-based Binary Symbolic Execution
☆215Aug 15, 2025Updated 6 months ago
Alternatives and similar repositories for fuzzball
Users that are interested in fuzzball are comparing it to the libraries listed below
Sorting:
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆315Jun 25, 2020Updated 5 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- Python concolic execution framework for program analysis☆68Nov 13, 2014Updated 11 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆837Nov 19, 2024Updated last year
- afl-fuzz for javascript☆203Feb 11, 2017Updated 9 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- Modular And Compositional analysis with KLEE Engine☆117Dec 17, 2019Updated 6 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Aug 5, 2015Updated 10 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- ☆87Jun 5, 2015Updated 10 years ago
- ☆386Oct 28, 2019Updated 6 years ago
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- Driller: augmenting AFL with symbolic execution!☆965Mar 24, 2025Updated 11 months ago
- The Jakstab static analysis platform for binaries☆163Dec 10, 2019Updated 6 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- Path based Dynamic Analysis☆118Mar 25, 2017Updated 8 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Feb 6, 2021Updated 5 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- Differential fuzzing for the masses!☆154Aug 9, 2017Updated 8 years ago
- Python Exploration with Z3☆340Dec 12, 2025Updated 2 months ago
- A bibliography of papers related to symbolic execution☆291Aug 12, 2016Updated 9 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Jan 17, 2017Updated 9 years ago
- Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"☆316Jun 11, 2020Updated 5 years ago
- An amd64 symbolic emulator☆314Aug 28, 2021Updated 4 years ago
- Program Analysis for LLVM☆38Mar 25, 2017Updated 8 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆419Jun 6, 2018Updated 7 years ago
- Grey-box Concolic Testing on Binary Code (ICSE '19)☆156Oct 4, 2021Updated 4 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- print information from LLVM dataflow analyses☆13Jan 22, 2020Updated 6 years ago