Mythril is a symbolic-execution-based securty analysis tool for EVM bytecode. It detects security vulnerabilities in smart contracts built for Ethereum and other EVM-compatible blockchains.
-
Updated
Nov 3, 2025 - Python
Mythril is a symbolic-execution-based securty analysis tool for EVM bytecode. It detects security vulnerabilities in smart contracts built for Ethereum and other EVM-compatible blockchains.
Symbolic execution tool
Reverse engineering framework in Python
An analysis tool for Python that blurs the line between testing and type systems.
A unit test-like interface for fuzzing and symbolic execution
The official repository of "ChatDB: Augmenting LLMs with Databases as Their Symbolic Memory".
yet another tool for analysing binaries
Offensive vulnerability scanner for ethereum, and symbolic execution tool for the Ethereum Virtual Machine
symbolic execution plugin for binary ninja
Simplify Ethereum security analysis and testing
Symbiotic is a tool for finding bugs in computer programs based on instrumentation, program slicing and KLEE
Monitor smart contracts deployed on blockchain and test against vulnerabilities with Mythril. It was presented at DEFCON 2019.
Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.
Automatic ROPChain Generation
Cairo/Starknet security toolkit (bytecode analyzer, disassembler, decompiler, symbolic execution, SBMC)
SymGDB - symbolic execution plugin for gdb
Seeding fuzzers with symbolic execution
MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.
PASTIS: Collaborative Fuzzing Framework
Add a description, image, and links to the symbolic-execution topic page so that developers can more easily learn about it.
To associate your repository with the symbolic-execution topic, visit your repo's landing page and select "manage topics."