Run android with S2E
☆31Dec 11, 2014Updated 11 years ago
Alternatives and similar repositories for android_s2e
Users that are interested in android_s2e are comparing it to the libraries listed below
Sorting:
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- blog☆16Apr 27, 2020Updated 5 years ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆315Jun 25, 2020Updated 5 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- An Android port of the melkor ELF fuzzer☆63Aug 21, 2014Updated 11 years ago
- ☆26May 10, 2021Updated 4 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- ☆10Oct 30, 2016Updated 9 years ago
- Patterns for the l7-filter packet classifier (kernel version). You can find new protocols at https://www.netify.ai/resources/protocols☆11Jun 18, 2014Updated 11 years ago
- Implementation of Taint Tracking in LLVM compiler.☆10Jan 1, 2013Updated 13 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- You can use ropper to display information about files in different file formats and you can find gadgets to build rop chains for differen…☆12Jun 7, 2018Updated 7 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- Tool to resolve symbols by the address of the binary☆15Sep 21, 2018Updated 7 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Feb 6, 2021Updated 5 years ago
- FuzzBALL: Vine-based Binary Symbolic Execution☆215Aug 15, 2025Updated 6 months ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Jan 9, 2014Updated 12 years ago
- CVE-2014-3153 exploit☆19Oct 7, 2015Updated 10 years ago
- A hacky clang analyzer checker that looks for potentially exploitable kernel integer overflows.☆20May 13, 2018Updated 7 years ago
- Home for the WALi weighted automaton library and OpenNWA nested-word automaton library☆17Nov 28, 2018Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Sep 27, 2017Updated 8 years ago
- Parse and tamper DEX file☆17Dec 12, 2016Updated 9 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- ☆22Apr 17, 2023Updated 2 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- An XNU kernel fuzz tool☆22Mar 3, 2010Updated 15 years ago
- Dronity, the Trinity syscall fuzzer ported to Android☆43Oct 10, 2015Updated 10 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- ☆22Aug 25, 2018Updated 7 years ago
- Superion is a fuzzer which extends the famous AFL to support structured inputs such as JavaScript and XML.☆141Aug 18, 2022Updated 3 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 3 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆23Dec 5, 2017Updated 8 years ago