ercoppa / symbolic-execution-tutorialLinks
Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.
☆132Updated 4 years ago
Alternatives and similar repositories for symbolic-execution-tutorial
Users that are interested in symbolic-execution-tutorial are comparing it to the libraries listed below
Sorting:
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- KLEE / CSE Project☆45Updated 5 years ago
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- Utilities for generating dynamic traces☆92Updated 3 months ago
- ☆144Updated 8 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Updated last week
- We hinder fuzzing☆68Updated 3 years ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆228Updated 3 years ago
- Challenge binaries (CBs) and tools from DARPA's Cyber Grand Challenge (CGC)☆18Updated 3 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- ☆98Updated 4 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆61Updated 2 years ago
- The new phuzzing framework!☆159Updated last year
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- A collection of extensions to angr to handle new platforms☆67Updated 3 months ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- A LLVM Sanitizer for Symbolic Tracing☆222Updated last week
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆83Updated last week
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 3 years ago
- Scalable Validator for Binary Lifters☆56Updated 4 years ago
- fuzzing + concolic = fuzzolic :)☆121Updated last month
- The Jakstab static analysis platform for binaries☆158Updated 5 years ago
- An interactive tool for better understanding and intervening fuzzing process via real-time visualization.☆76Updated 3 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago