qb_triton Profile Banner
The Triton library Profile
The Triton library

@qb_triton

Followers
2K
Following
52
Media
10
Statuses
154

A dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.

.text
Joined July 2015
Don't wanna be here? Send us removal request.
@hackyboiz
hackyboiz
3 months
[Research] LLVM based VMProtect Devirtualization: Part 1 (EN) https://t.co/H2M9CQtkTy Hello, this is banda. In this post, I summarize the process of analyzing and devirtualizing VMProtect’s virtualization obfuscation using LLVM-based techniques. I also experimented with
2
61
293
@dp__pd
Damian Pfammatter
1 year
A while back, I wanted to learn about @qb_triton and symbolic execution in general, and to research its challenges when it comes to real-world binaries. What began with a few simple scripts evolved into PoC tool called Morion, which I've just released. #symbex #libtriton #morion
1
4
9
@VishnyaSweet
Alexey Vishnyakov
2 years
Discovering 12 new integer truncation #bugs (and generating PoC seeds) in LibTIFF, libpcap, nDPI, unbound, FreeImage with dynamic #symbolic execution. https://t.co/ocTs1988Jz
1
5
28
@horsicq
Hors
2 years
VMProtect Source Code (Leaked 07.12.2023) https://t.co/tvOCxAK30R
11
189
628
@qb_triton
The Triton library
2 years
🔥
@Vishnyak0v
Alexey Vishnyakov
2 years
Just teammate's hobby ...) #VMProtect devirtualizer https://t.co/SjxOpcusl8
0
0
1
@Farenain
Farenain
2 years
Hello everyone, today I have uploaded the second post on using @qb_triton for analyzing a challenge from hacklu from 2 years ago:
farena.in
Following the previous post about using Triton for solving challenges through symbolic execution and SMT Solving, this time we will try solving an obfuscated hacklu.
2
12
37
@0xdeadc0de___
deadc0de
2 years
A nice WU of zer0pts using @qb_triton from @Gaburall https://t.co/lsmVbq9HIF !
0
3
12
@0x_shaq
faulty *ptrrr
2 years
CTF rev players discovering symbolic execution
20
277
2K
@Farenain
Farenain
2 years
Good morning everyone! I have finished writing the blog post solving the challenge from @HexRaysSA using @qb_triton and TritonDSE by @quarkslab , you can find the post in my web site: https://t.co/GXRihF5LCI I have used chatGPT for helping me improving my writing, enjoy!
farena.in
Triton is a library for doing Symbolic Execution, useful for doing common CTF challenges and analyzing obfuscations. TritonDSE is a library built on top of Triton which provides easy and customizable...
2
29
102
@infernosec
Abhishek Arya
3 years
SBFT'23 results are out, congrats to the winners of HasteFuzz, PASTIS & AFLrustrust fuzzer authors that show fuzzing improvements that outperform current industry benchmarks! These improvements will flow in OSS-Fuzz/fuzzing engines in the months to come-
Tweet card summary image
security.googleblog.com
Dongge Liu, Jonathan Metzman and Oliver Chang, Google Open Source Security Team Google’s Open Source Security Team recently sponsored a fuzz...
0
22
92
@quarkslab
quarkslab
3 years
Spice up your binary program analysis with TritonDSE ! A blog post by Christian Heitman and @RobinDavid1 introducing our framework for Dynamic Symbolic Execution in Python #symexec #fuzzing #opensource https://t.co/fay9SlKee7
0
22
56
@VishnyaSweet
Alexey Vishnyakov
3 years
Sydr-Fuzz: Continuous Hybrid Fuzzing and Dynamic Analysis for Security Development Lifecycle https://t.co/yTqLwILjmL 85 new bugs. #fuzzing with Sydr + libFuzzer/@aflplusplus, symbolic security predicates, crash triaging with Casr:
Tweet card summary image
github.com
Collect crash (or UndefinedBehaviorSanitizer error) reports, triage, and estimate severity. - ispras/casr
5
14
67
@qb_triton
The Triton library
3 years
@rh0main
Romain THOMAS
3 years
It's a pleasure to announce the release of open-obfuscator: a free and open-source solution for obfuscating Android and iOS applications (Java/Kotlin, C/C++/Objective-C) https://t.co/nBYleNkcdA https://t.co/epzNK1fqKW
0
1
8
@JonathanSalwan
Jonathan Salwan
3 years
Bootstraping code coverage on top of the Triton library. https://t.co/lH2M4OG2Ho
0
11
38
@Th1errry
Thierry
3 years
Slides of my talk at @hexacon_fr about my journey of fuzzing Nvidia graphic driver are now available:
drive.google.com
2
94
262