trailofbits / manticore-examplesLinks
Example Manticore scripts
☆68Updated last year
Alternatives and similar repositories for manticore-examples
Users that are interested in manticore-examples are comparing it to the libraries listed below
Sorting:
- poststructural fuzzing☆31Updated 5 years ago
- Ethereum smart contract reverse engineering☆103Updated 7 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 7 years ago
- The Manticore User Interface with plugins for Binary Ninja and Ghidra☆75Updated last year
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- single file ctf/exploit client library - python3, type annotated☆70Updated 2 years ago
- Avalanche is a document generator which uses context-free grammars to generate randomized outputs for fuzz-testing.☆32Updated 4 years ago
- The Ghidra EVM Module (ghidra-evm) leverages Ghidra 9.1.2 to disassemble and analyze compiled Ethereum smart contracts. Ghidra-evm was pr…☆143Updated 3 years ago
- IDA Processor Module for the Ethereum Virtual Machine (EVM)☆314Updated last year
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Fuzzing results for various interpreters.☆82Updated 7 years ago
- Code to fuzz bignum libraries☆46Updated 6 years ago
- quals-2014☆21Updated 10 years ago
- evm binary static analysis☆362Updated 2 years ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- ☆26Updated 9 years ago
- Writings on symbolic-execution-based security analysis of EVM smart contracts.☆173Updated 6 years ago
- Symbolic virtual machine for Ethereum☆69Updated 7 years ago
- ☆24Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Scrooge McEtherface is an Ethereum auto-looter that was presented at DEFCON 2019. It uses symbolic execution & SMT solving to generically…☆151Updated 2 years ago
- Experiments in trying to find 0-days in numpy☆38Updated 8 years ago
- ☆22Updated 8 years ago
- Check for assertion violations on Solidity smart contracts using grey-box fuzzing and symbolic analysis.☆31Updated 2 years ago
- A set of templates for different academic venues.☆28Updated 6 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- Complete examples of solidity exploits☆13Updated 7 years ago
- Scripts for collecting metrics of the attack surface☆15Updated 4 years ago
- ☆12Updated 9 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago