Should security vendors publish (open source) offensive toolkits & malware POCs for research purposes, given high likelihood of misuse?
As a rule, we do not publish any code that is useful without modification to conduct attacks. So, no exploit code from Trail of Bits, sorry.
-
-
Thanks Dan, that's really helpful.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
For an example in practice, see Manticore:https://blog.trailofbits.com/2017/04/27/manticore-symbolic-execution-for-humans/ …
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.