The Chef symbolic execution platform, based off S2E
☆12Nov 1, 2022Updated 3 years ago
Alternatives and similar repositories for chef
Users that are interested in chef are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A modded Python interpreter that supports symbolic execution.☆11Aug 23, 2015Updated 10 years ago
- Slides and demos☆48Mar 24, 2015Updated 10 years ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- like ROP Defender☆10May 6, 2015Updated 10 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- AFL enhanced for concurrency bug and vulnerabilities☆19Sep 18, 2020Updated 5 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- Automatic hacking tool for URL regexes.☆11Feb 12, 2021Updated 5 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- Very bad port of fake86 for CP/M 2.2 (Z80 based computers like ZX Spectrum)☆11May 9, 2022Updated 3 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- Dynamic tracing for binary applications (using PIN), IDA plugin to visualize and interact with the traces☆96Mar 24, 2012Updated 13 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- ☆13Feb 17, 2026Updated last month
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Feb 5, 2026Updated last month
- GKLEE is a symbolic analyser and test generator tailored for CUDA C++ programs☆40Mar 23, 2021Updated 5 years ago
- symbolic execution engine for brainfuck because lol☆14Feb 5, 2017Updated 9 years ago
- ☆13Jun 15, 2024Updated last year
- Binary Ninja Plugin for devi - see https://github.com/murx-/devi/ for devi details☆20Jan 17, 2024Updated 2 years ago
- ☆13Apr 10, 2025Updated 11 months ago
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago
- Python concolic execution framework for program analysis☆67Nov 13, 2014Updated 11 years ago
- Javascript library fuzzer. Tries to detect functions which may lead to XSS vulnerabilities if untrusted data is passed to said functions.☆16Oct 6, 2020Updated 5 years ago
- Concolic Exection Engine for Golang☆10May 16, 2018Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- 異常発音☆10Feb 11, 2026Updated last month
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆34Feb 8, 2022Updated 4 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- Extension library for the Kitty fuzzing framework☆80Mar 6, 2020Updated 6 years ago
- 华中科技大学物理网考题库☆11Dec 13, 2018Updated 7 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- ☆13Dec 6, 2015Updated 10 years ago
- A Python GUI that uses a browser to draw things.☆13Feb 5, 2025Updated last year
- Generation of sequential and concurrent unit tests to find correctness and performance problems in Java classes☆16Jul 20, 2019Updated 6 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago