The Triton library
@qb_triton
Followers
2K
Following
52
Media
10
Statuses
154
A dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
.text
Joined July 2015
[Research] LLVM based VMProtect Devirtualization: Part 1 (EN) https://t.co/H2M9CQtkTy Hello, this is banda. In this post, I summarize the process of analyzing and devirtualizing VMProtect’s virtualization obfuscation using LLVM-based techniques. I also experimented with
2
61
293
LummaC2: Obfuscation Through Indirect Control Flow https://t.co/1AuKDWJLWZ 👀 #tritonlibrary
cloud.google.com
Analysis of malware samples using a technique to thwart all binary analysis tools, and hinder reverse engineering efforts.
0
2
19
A while back, I wanted to learn about @qb_triton and symbolic execution in general, and to research its challenges when it comes to real-world binaries. What began with a few simple scripts evolved into PoC tool called Morion, which I've just released. #symbex #libtriton #morion
1
4
9
RISC-V 32/64 support is now available. Huge thx for everyone involved in this contribution <3
github.com
Hi! Added basic support for RISCV instruction set. This covers most of IMC standard ISA extensions for RV32 & RV64. It would be great if you could give some review and merge it. Some detail...
0
7
18
Discovering 12 new integer truncation #bugs (and generating PoC seeds) in LibTIFF, libpcap, nDPI, unbound, FreeImage with dynamic #symbolic execution. https://t.co/ocTs1988Jz
1
5
28
Just teammate's hobby ...) #VMProtect devirtualizer https://t.co/SjxOpcusl8
github.com
Titan is a VMProtect devirtualizer. Contribute to archercreat/titan development by creating an account on GitHub.
1
62
190
Hello everyone, today I have uploaded the second post on using @qb_triton for analyzing a challenge from hacklu from 2 years ago:
farena.in
Following the previous post about using Triton for solving challenges through symbolic execution and SMT Solving, this time we will try solving an obfuscated hacklu.
2
12
37
0
3
12
Good morning everyone! I have finished writing the blog post solving the challenge from @HexRaysSA using @qb_triton and TritonDSE by @quarkslab , you can find the post in my web site: https://t.co/GXRihF5LCI I have used chatGPT for helping me improving my writing, enjoy!
farena.in
Triton is a library for doing Symbolic Execution, useful for doing common CTF challenges and analyzing obfuscations. TritonDSE is a library built on top of Triton which provides easy and customizable...
2
29
102
SBFT'23 results are out, congrats to the winners of HasteFuzz, PASTIS & AFLrustrust fuzzer authors that show fuzzing improvements that outperform current industry benchmarks! These improvements will flow in OSS-Fuzz/fuzzing engines in the months to come-
security.googleblog.com
Dongge Liu, Jonathan Metzman and Oliver Chang, Google Open Source Security Team Google’s Open Source Security Team recently sponsored a fuzz...
0
22
92
Spice up your binary program analysis with TritonDSE ! A blog post by Christian Heitman and @RobinDavid1 introducing our framework for Dynamic Symbolic Execution in Python #symexec #fuzzing #opensource
https://t.co/fay9SlKee7
0
22
56
Sydr-Fuzz: Continuous Hybrid Fuzzing and Dynamic Analysis for Security Development Lifecycle https://t.co/yTqLwILjmL 85 new bugs. #fuzzing with Sydr + libFuzzer/@aflplusplus, symbolic security predicates, crash triaging with Casr:
github.com
Collect crash (or UndefinedBehaviorSanitizer error) reports, triage, and estimate severity. - ispras/casr
5
14
67
Triaging a large number of crashes using symbolic execution. Impressive work by @jordan9001 at @Atredis using Triton. https://t.co/5cUZbeRAGL
atredis.com
Symbolic Execution can get a bad rap. Generic symbex tools have a hard time proving their worth when confronted with a sufficiently complex target. However, I have found symbolic execution can be...
0
16
33
New toys 😍 https://t.co/u1i02wk0YI
It's a pleasure to announce the release of open-obfuscator: a free and open-source solution for obfuscating Android and iOS applications (Java/Kotlin, C/C++/Objective-C) https://t.co/nBYleNkcdA
https://t.co/epzNK1fqKW
0
1
8
Slides of my talk at @hexacon_fr about my journey of fuzzing Nvidia graphic driver are now available:
drive.google.com
2
94
262