Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution
☆15Dec 30, 2021Updated 4 years ago
Alternatives and similar repositories for symbion-use-cases
Users that are interested in symbion-use-cases are comparing it to the libraries listed below
Sorting:
- ☆17Sep 23, 2024Updated last year
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 2 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- This repository contains the currently implemented angr concrete targets.☆34Sep 1, 2023Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- Capture The Flag for practice and contest☆17Dec 9, 2022Updated 3 years ago
- Cryfind is a tool to help you find crypto signatures in binary.☆36Oct 19, 2021Updated 4 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 10 months ago
- Python bindings for Shimple/Jimple IR from Soot.☆43Feb 27, 2026Updated last week
- ☆82Sep 3, 2021Updated 4 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆186Jul 28, 2022Updated 3 years ago
- CodeQL library and queries for iterator invalidation☆22May 5, 2021Updated 4 years ago
- LLDB based debugger for Linux Kernel☆28Apr 5, 2025Updated 11 months ago
- The slides from my Saintcon 2019 talk.☆48Feb 9, 2020Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- ☆47May 18, 2020Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- ☆239Jan 14, 2024Updated 2 years ago
- AIL: The angr Intermediate Language.☆33May 28, 2025Updated 9 months ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- angr's exploration technique to perform taint analysis☆65Mar 26, 2020Updated 5 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- ☆11May 17, 2024Updated last year
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 9 months ago
- ☆130May 15, 2025Updated 9 months ago
- ☆134May 6, 2024Updated last year