Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.
☆34Jul 29, 2018Updated 7 years ago
Alternatives and similar repositories for wasabi-aeg
Users that are interested in wasabi-aeg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 4 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- ☆15Jul 25, 2019Updated 6 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆10Oct 30, 2016Updated 9 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Saryn: Fuzzing with Taint Inference☆16Jun 16, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆11Apr 27, 2020Updated 5 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 7 months ago
- Kernel debugger using Timeless Debugging method.☆74Feb 16, 2017Updated 9 years ago
- ☆12Feb 20, 2022Updated 4 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Feb 5, 2026Updated last month
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 6 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆29Mar 6, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 7 years ago
- LN-fuzz: State Sequence Network Protocol Fuzzer☆11Jun 16, 2021Updated 4 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆38Oct 12, 2022Updated 3 years ago
- spike-vp☆13Feb 5, 2024Updated 2 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Jan 13, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- .netアプリケーションの関数を実行時に置き換えるプログラム☆15Jan 21, 2017Updated 9 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- A UEFI application that measures the number of cycles involved in a VM entry/exit☆31Oct 3, 2017Updated 8 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- my automatic exploit generation (DEPRECATED)☆59Jun 21, 2016Updated 9 years ago
- S2E Core Engine Library☆15Jan 7, 2020Updated 6 years ago