Triton DBA framework

@qb_triton

Dynamic Binary Analysis Framework for x86, x86-64 and AArch64 binaries. Perform program analysis and software verification using Python bindings

Vrijeme pridruživanja: srpanj 2015.

Tweetovi

Blokirali ste korisnika/cu @qb_triton

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @qb_triton

  1. 21. sij

    Automatic ROP chain generation using ROPgadget (gadgets finding) and Triton (sym. exec. part) by !!

    Poništi
  2. 3. lis 2019.

    Another use case of Triton in order to analyse obfuscated binary.

    Poništi
  3. 1. lis 2019.

    After more than 1 year, we are glad to announce the release of Triton v0.7 - AArch64 semantics, Android compilation, Python 3.6, bug fixes and much more! is already working on the v0.8 and have some surprises in store =)

    Poništi
  4. proslijedio/la je Tweet
    3. ruj 2019.

    When QBDI meets on Android AArch64 :)

    Poništi
  5. proslijedio/la je Tweet
    27. kol 2019.

    One direct application of QBDI for reverse engineering obfuscated code on Android/AArch64 would be with 's taint and symbolic engines combined with 's Remill that enables to lift AArch64 -> IR LLVM.

    Poništi
  6. proslijedio/la je Tweet
    16. kol 2019.

    Example of IDA+Triton plugin in order to extract opaque predicates where their computation is local to a single basic block using a Forward-Bounded DSE.

    Poništi
  7. proslijedio/la je Tweet
    31. pro 2018.
    Poništi
  8. proslijedio/la je Tweet
    22. pro 2018.

    Using , Python and Decompiler to deobfuscate code - still lots to be done but starting getting readable results !

    Poništi
  9. 12. stu 2018.

    After more than 1 year from v0.5, the v0.6 of Triton has been tagged as release! - Version 0.7 will focus on AArch64 already in development at !

    Poništi
  10. proslijedio/la je Tweet
    12. srp 2018.

    [BLOG] Symbolic Deobfuscation: From Virtualized Code Back to the Original Work presented at DIMWA 2018 by

    Poništi
  11. proslijedio/la je Tweet
    29. lip 2018.

    Paper, slides and results about our talk "Symbolic deobfuscation: from virtualized code back to the original" (few months of work with Quarkslab, CEA-List and Verimag)

    Poništi
  12. proslijedio/la je Tweet
    29. lip 2018.
    Poništi
  13. 6. lip 2018.

    After few months of work we pushed a huge improvement regarding the memory consumption of the libTriton and it's now available on the v0.6!

    Poništi
  14. proslijedio/la je Tweet
    21. svi 2018.

    Our approach about solving the Tigress challenge in 2016 will be published at DIMVA 2018.

    Poništi
  15. 18. svi 2018.

    Automatic removal of junk instructions through state tracking - Use case of Triton and obfuscated code (VMProtect). Nice one =)

    Poništi
  16. proslijedio/la je Tweet
    22. velj 2018.

    I often bitch about the state of tooling, but RR is wonderful. And while Triton is not quite 100%, it strongly looks as if it will be wonderful soon.

    Poništi
  17. proslijedio/la je Tweet
    13. velj 2018.

    Deobfuscation with symbolic execution in practice with

    Poništi
  18. proslijedio/la je Tweet
    1. velj 2018.

    Excited about Triton. Looks well-engineered, clean, focused, and super nice developers. Testing it hard on real world problems today, fingers crossed that it & z3 can pull through.

    Poništi
  19. proslijedio/la je Tweet
    26. pro 2017.
    Poništi
  20. proslijedio/la je Tweet
    26. pro 2017.

    I can finally release 2.5 years of work on DBIs with at ! 0.5 is released and available here: The github is here: Come see our talk at the 28th at 22:00 in saal Dijkstra!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·