« Projects

Symbolic Exploit Assistant

  • Q: I'd like to participate. How do I begin?

  • Q: Other than writing code, how can I contribute?

    • 0
      Improve the web of SEA

      Using the corresponding github repository, a simple web for the project was created (http://seatool.org but it needs more love!


         — aka neuromancer (galapag0) · 4 years ago
    • [X]
      • Tip:

        Discuss documentation, testing, webmastering, and/or publicity.

        Include URLs if relevant (we'll automatically linkify them).

      • Example:

        We need people to download version 0.4.5 and make sure the frobulator still frobulates correctly.

  • Q: What's a good bug for a newcomer to tackle?

    • 0
      Add support for relocation table reading

      Detecting which functions are outside an executable file is important to analyze it (https://en.wikipedia.org/wiki/Relocation_table).
      The issue is here: https://github.com/neuromancer/SEA/issues/12

      (but contact me for more details!)


         — aka neuromancer (galapag0) · 4 years ago
    • [X]
      • Tip:

        Many projects have good small tasks that can teach newcomers how the project works. Now's your chance to share one of them!

        Include URLs if relevant (we'll automatically linkify them).

      • Example:

        Someone could improve the photo upload dialog box so that it lets you resize the photo before sending it to the web.

  • Q: What is a bug or issue with Symbolic Exploit Assistant that you've been putting off, neglecting, or just plain avoiding?

    • [X]
      • Examples:

        I don't know how to get started with internationalizing my app.

        Bug 392 about printing was filed five years ago, and I don't even know if printing still works.

        I want help from a C coder writing a Maildir patch for Alpine.

      • Note:

        If this issue was formally filed on the web, be sure to include the URL.

What else do you want to talk about?

About Symbolic Exploit Assistant

(logo)

"Symbolic Exploit Assistant" ( SEA ) is a small tool designed to assist the discovery and construction of exploits in binary programs. SEA is free software (GPL3) and includes a minimal toolkit (BSD) to quickly develop binary analisys tools in Python.

from the profile of aka neuromancer (galapag0)

The code is mostly written in Python.

People who want to help (none listed yet)

Volunteer opportunities, etc.

No volunteer opportunities in Symbolic Exploit Assistant indexed here yet. Add a bug tracker.

No one on OpenHatch has signed up as a mentor for Symbolic Exploit Assistant. Can you? Add the tag.

There are 327 people who can mentor in Python, Symbolic Exploit Assistant's primary language.

You can embed the "I want to help" button on your website. (More about this.)