macaron-et / wasabi-aegView external linksLinks
Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.
☆34Jul 29, 2018Updated 7 years ago
Alternatives and similar repositories for wasabi-aeg
Users that are interested in wasabi-aeg are comparing it to the libraries listed below
Sorting:
- ☆10Oct 30, 2016Updated 9 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 4 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- ☆15Jul 25, 2019Updated 6 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Saryn: Fuzzing with Taint Inference☆16Jun 16, 2022Updated 3 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Feb 5, 2026Updated last week
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- Virtual Inheritance Reverse Engineering☆18Aug 20, 2020Updated 5 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆29Mar 6, 2024Updated last year
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆38Oct 12, 2022Updated 3 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- ☆27Nov 30, 2018Updated 7 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 6 months ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 5 years ago
- Large-Scale Graph Inference☆12Nov 6, 2024Updated last year
- ☆13May 5, 2018Updated 7 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- ☆11Apr 27, 2020Updated 5 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Jan 13, 2023Updated 3 years ago
- Kernel debugger using Timeless Debugging method.☆74Feb 16, 2017Updated 8 years ago
- TRACER Symbolic Execution Tool☆28Jun 16, 2020Updated 5 years ago
- A UEFI application that measures the number of cycles involved in a VM entry/exit☆31Oct 3, 2017Updated 8 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- Exploits for various CVEs☆11Mar 19, 2022Updated 3 years ago
- spike-vp☆12Feb 5, 2024Updated 2 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- LN-fuzz: State Sequence Network Protocol Fuzzer☆11Jun 16, 2021Updated 4 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- Nintendo switch debugger for radare2☆13Aug 12, 2018Updated 7 years ago
- A small group for NCU students who want to learn Hacking.☆12Dec 17, 2017Updated 8 years ago