Symbolic execution tool
-
Updated
Dec 8, 2022 - Python
Symbolic execution tool
Reverse engineering framework in Python
Security analysis tool for EVM bytecode. Supports smart contracts built for Ethereum, Hedera, Quorum, Vechain, Roostock, Tron and other EVM-compatible blockchains.
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Binary Analysis Platform
IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
An open source interactive disassembler
A curated list of awesome symbolic execution resources including essential research papers, lectures, videos, and tools.
An analysis tool for Python that blurs the line between testing and type systems.
Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution.
Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.
A unit test-like interface for fuzzing and symbolic execution
Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.
History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)
yet another tool for analysing binaries
Simple Theorem Prover, an efficient SMT solver for bitvectors
Automatic verification of LLVM optimizations
Use angr in Ghidra
A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks
Add a description, image, and links to the symbolic-execution topic page so that developers can more easily learn about it.
To associate your repository with the symbolic-execution topic, visit your repo's landing page and select "manage topics."