Open-source symbolic execution framework: https://maat.re
☆648Feb 22, 2026Updated 3 weeks ago
Alternatives and similar repositories for maat
Users that are interested in maat are comparing it to the libraries listed below
Sorting:
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆209Updated this week
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 3 years ago
- A lightweight dynamic instrumentation library☆1,328Mar 13, 2026Updated last week
- SymQEMU: Compilation-based symbolic execution for binaries☆371May 5, 2025Updated 10 months ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- An LLVM-based instrumentation tool for universal taint tracking, dataflow analysis, and tracing.☆591Feb 20, 2026Updated last month
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,098Mar 8, 2026Updated last week
- SymCC: efficient compiler-based symbolic execution☆862Updated this week
- A powerful static binary rewriting tool☆1,097Mar 3, 2026Updated 2 weeks ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆231Jun 9, 2020Updated 5 years ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆620Dec 20, 2024Updated last year
- Snapshot-based coverage-guided windows kernel fuzzer☆325Dec 16, 2021Updated 4 years ago
- A binary analysis framework written in Rust.☆177Mar 1, 2026Updated 2 weeks ago
- A Trace Explorer for Reverse Engineers☆1,525Oct 23, 2023Updated 2 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- Library for lifting machine code to LLVM bitcode☆1,642Mar 11, 2026Updated last week
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,299Mar 2, 2026Updated 2 weeks ago
- revng: the core repository of the rev.ng project☆1,640Mar 11, 2026Updated last week
- Karta - source code assisted fast binary matching plugin for IDA☆905May 13, 2023Updated 2 years ago
- Time Travel Debugging IDA plugin☆596Jun 27, 2024Updated last year
- High-performance QEMU memory and instruction tracing☆554Jul 26, 2024Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,326Apr 10, 2025Updated 11 months ago
- Bindings for Microsoft WinDBG TTD☆235Aug 5, 2023Updated 2 years ago
- Use angr in Ghidra☆619Jul 29, 2024Updated last year
- A fast and accurate disassembler☆741Jan 23, 2026Updated last month
- ☆330Jun 20, 2024Updated last year
- ☆189Mar 21, 2025Updated last year
- A reversing plugin for cross-decompiler collaboration, built on git.☆689Updated this week
- A LLVM Sanitizer for Symbolic Tracing☆235Updated this week
- Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode☆2,761Apr 26, 2022Updated 3 years ago
- A Coverage Explorer for Reverse Engineers☆2,513Feb 14, 2026Updated last month
- anvill forges beautiful LLVM bitcode out of raw machine code☆366Sep 3, 2024Updated last year
- An Interactive Hex-Rays Microcode Explorer☆652Feb 8, 2024Updated 2 years ago
- A Dynamic Binary Instrumentation framework based on LLVM.☆1,742Feb 20, 2026Updated last month
- A True Instrumentable Binary Emulation Framework☆5,840Nov 5, 2025Updated 4 months ago
- Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions☆352Feb 2, 2026Updated last month
- symbolic execution plugin for binary ninja☆350Jan 26, 2026Updated last month
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Mar 26, 2022Updated 3 years ago
- gooMBA is a Hex-Rays Decompiler plugin to simplify Mixed Boolean-Arithmetic (MBA) expressions☆670Nov 10, 2025Updated 4 months ago