Open-source symbolic execution framework: https://maat.re
☆648Updated this week
Alternatives and similar repositories for maat
Users that are interested in maat are comparing it to the libraries listed below
Sorting:
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆209Updated this week
- A lightweight dynamic instrumentation library☆1,308Apr 1, 2025Updated 11 months ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- A powerful static binary rewriting tool☆1,089Feb 15, 2026Updated 2 weeks ago
- An LLVM-based instrumentation tool for universal taint tracking, dataflow analysis, and tracing.☆588Feb 20, 2026Updated last week
- SymQEMU: Compilation-based symbolic execution for binaries☆368May 5, 2025Updated 9 months ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆621Dec 20, 2024Updated last year
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆548Feb 1, 2024Updated 2 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆231Jun 9, 2020Updated 5 years ago
- SymCC: efficient compiler-based symbolic execution☆856May 12, 2025Updated 9 months ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,070Dec 2, 2025Updated 2 months ago
- A Trace Explorer for Reverse Engineers☆1,520Oct 23, 2023Updated 2 years ago
- Snapshot-based coverage-guided windows kernel fuzzer☆323Dec 16, 2021Updated 4 years ago
- A binary analysis framework written in Rust.☆175Feb 22, 2026Updated last week
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- A reversing plugin for cross-decompiler collaboration, built on git.☆683Updated this week
- Karta - source code assisted fast binary matching plugin for IDA☆901May 13, 2023Updated 2 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,293Jan 13, 2026Updated last month
- A fast and accurate disassembler☆739Jan 23, 2026Updated last month
- revng: the core repository of the rev.ng project☆1,632Feb 21, 2026Updated last week
- Time Travel Debugging IDA plugin☆592Jun 27, 2024Updated last year
- Library for lifting machine code to LLVM bitcode☆1,605Feb 13, 2026Updated 2 weeks ago
- ☆189Mar 21, 2025Updated 11 months ago
- A LLVM Sanitizer for Symbolic Tracing☆234Feb 7, 2026Updated 3 weeks ago
- anvill forges beautiful LLVM bitcode out of raw machine code☆366Sep 3, 2024Updated last year
- High-performance QEMU memory and instruction tracing☆554Jul 26, 2024Updated last year
- An Interactive Hex-Rays Microcode Explorer☆648Feb 8, 2024Updated 2 years ago
- Use angr in Ghidra☆618Jul 29, 2024Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,322Apr 10, 2025Updated 10 months ago
- Bindings for Microsoft WinDBG TTD☆235Aug 5, 2023Updated 2 years ago
- Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions☆345Feb 2, 2026Updated 3 weeks ago
- A Dynamic Binary Instrumentation framework based on LLVM.☆1,730Feb 20, 2026Updated last week
- A Coverage Explorer for Reverse Engineers☆2,500Feb 14, 2026Updated 2 weeks ago
- Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode☆2,751Apr 26, 2022Updated 3 years ago
- A high performance LLVM-based dynamic binary instrumentation framework☆286Jun 7, 2024Updated last year
- Header only wrapper around Hex-Rays API in C++20.☆168Dec 25, 2024Updated last year
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Mar 26, 2022Updated 3 years ago
- Hexrays Toolbox - Find code patterns within the Hexrays ctree☆482Jun 20, 2023Updated 2 years ago
- gooMBA is a Hex-Rays Decompiler plugin to simplify Mixed Boolean-Arithmetic (MBA) expressions☆670Nov 10, 2025Updated 3 months ago