Unicorn Engine Profile
Unicorn Engine

@unicorn_engine

Followers
6K
Following
833
Media
31
Statuses
1K

The Ultimate CPU Emulator. Also see our related frameworks @capstone_engine, @keystone_engine

Joined June 2015
Don't wanna be here? Send us removal request.
@unicorn_engine
Unicorn Engine
3 years
We are happy to announce that Unicorn Engine was awarded by @alibaba_cloud for its impact on the cybersecurity field! https://t.co/buwL9amTni
0
1
11
@hoheinzollern
Alessandro Bruni
1 year
Building a small x86 CPU emulator with @rustlang and the awesome @unicorn_engine and #iced_rs. Do I have a chance to run this on the web?
0
1
7
@onlyxwings
kaijern (xwings)
1 year
Yet another work based on @unicorn_engine @capstone_engine and @keystone_engine
@rcx86
Mr. Rc
1 year
I'm working on a Visual Debugger for Assembly (x86, arm and other major archs.) which is going to be cross platform and FOSS Demo video link in post below cc @_buildspace @_nightsweekends
1
5
25
@Verichains
Verichains
2 years
🤝 We’re thrilled to partner with @Aptos_Labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: https://t.co/O6yqL2A5aP   Revela is also
Tweet card summary image
github.com
Decompiler for Move smart contracts. Contribute to verichains/revela development by creating an account on GitHub.
@wgrieskamp
Wolfgang Grieskamp
2 years
The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! https://t.co/bauJqxCgwY
4
17
47
@wgrieskamp
Wolfgang Grieskamp
2 years
The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! https://t.co/bauJqxCgwY
Tweet card summary image
medium.com
by Verichains and Aptos Labs
11
24
104
@_JohnHammond
John Hammond
2 years
FAST malware analysis with binary emulation! @asoni taught me a ton of sweet stuff going through a Qakbot sample, Cobalt Strike and more using emulation frameworks like Unicorn and Qiling... seriously super cool, huge thanks to Anuj for showcasing! https://t.co/PhYxUxaMm9
6
57
228
@redragonvn
Thanh Nguyen
2 years
2/ This remind me of the response from CEO of #Multichain after we reported critical #MPC #vulnerabilities. It was later found out that all MPC 'trusted nodes' were actually run under the his personal cloud account and the #bridge got #hacked eventually! https://t.co/4apCYJBJtY
@MultichainOrg
Multichain (Previously Anyswap)
2 years
1. On May 21, 2023, Multichain CEO Zhaojun was taken away by the Chinese police from his home and has been out of contact with the global Multichain team ever since. The team contacted the MPC node operators and learned that their operational access keys to MPC node servers had
1
2
4
@redragonvn
Thanh Nguyen
2 years
3/ Reporting bugs directly to vendor or via #bugbounty are both painful. For example, #THORChain stopped responding to our emails after receiving full POC & paper. Even though they had halted the chain globally due to our report
@WuBlockchain
Wu Blockchain
3 years
THORChain: There are claims of a potential vulnerability with a THORChain dependency that may affect THORChain. Out of an abundance of caution, steps have been taken to halt THORChain globally. THORChain is a settlement layer that facilitates swaps between 8 chains.
0
1
4
@redragonvn
Thanh Nguyen
2 years
4/ We've now opted to directly inform the public about the potential #risks instead. It's also important to remember that ##MPC and #ZKP are relatively new and complex protocols, making them susceptible to #vulnerabilities. Stay tuned for more MPC/ZKP #bugs releases from us!
0
2
6
@redragonvn
Thanh Nguyen
2 years
1/ After #TSSHOCK #MPC mass pwned, it's now #ZKP's turn. We've reported a Critical Proof Forgery Attack, allows anyone with access to an aggregator, to steal funds from a top #zkEVM Layer-2. Unsurprisingly, vendor's reply: '..not exploitable by anyone due to centralization'!!?
4
10
44
@pwnedmio
Lazymio
2 years
https://t.co/CZykUw7IZx https://t.co/at3fVsjy5E Finally, it's time to install @unicorn_engine on Debian/Ubuntu with apt!
0
1
4
@qiling_io
Qiling Framework
2 years
Limited space left!
@hitbsectrain
HITBSecTrain
2 years
Join @onlyxwings at #HITB2023HKT to discover bugs in IoT devices with the Qiling Framework. Learn standard workflows and leverage Qiling's capabilities for efficient emulation. Register at https://t.co/76cSjUwDQH #IoTsecurity #QilingFramework
0
2
3
@qiling_io
Qiling Framework
2 years
Our very first training. DM me if you need a discount coupon.
@hitbsectrain
HITBSecTrain
2 years
Join @onlyxwings at #HITB2023HKT to discover bugs in IoT devices with the Qiling Framework. Learn standard workflows and leverage Qiling's capabilities for efficient emulation. Register at https://t.co/76cSjUwDQH #IoTsecurity #QilingFramework
0
1
3
@Verichains
Verichains
2 years
Just In! Our TSSHOCK paper acceptance into @BlackHatEvents, the premier cybersecurity conference! #BHUSA Join our researchers in Vegas this August, as we will share in this briefing our critical 0-day attacks on MPC vaults and wallets. Brief notice here: https://t.co/1xb8tf93OX
0
5
14
@capstone_engine
Capstone Engine
2 years
Capstone 5.0 is out! https://t.co/fsU1G2nlLU Cc @Angrz3_K
3
40
86
@unicorn_engine
Unicorn Engine
2 years
It is nice to see Unicorn used there :-)
@boredpentester
Josh
2 years
I've put together a new blog post! This one re-treads @bl4sty's earlier AMLogic research but takes my own approach to exploit development, with an 'alternative' vulnerability and an emulator. Just for fun! https://t.co/ZjNFniOjz9
0
0
2
@behrangfouladi
Behrang Fouladi
3 years
I have published a tutorial on writing an emulator using the @unicorn_engine for security testing custom radio protocols on @NordicTweets SoCs. https://t.co/XtYyJBxFBq video: https://t.co/gfcLl6rFWj #IIoT #security #nrf52840
Tweet card summary image
github.com
nRF52840 emulator to run and test custom radio protocols - befoulad/nrf52_radio_emu
0
5
16
@ptracesecurity
Ptrace Security GmbH
3 years
Dumpulator - An Easy-To-Use Library For Emulating Memory Dumps. Useful For Malware Analysis (Config Extraction, Unpacking) And Dynamic Analysis In General (Sandboxing) https://t.co/Uxa0qA0NdM #Pentesting #CyberSecurity #Infosec
0
15
55
@mobilesecurity_
Mobile Security
3 years
Emulating Android native library to decrypt strings using Qiling Framework #MobileSecurity #AndroidSecurity [VIDEO] by @SecFatal https://t.co/1RUbU56xvs
0
21
76
@enovella_
Edu Novella
3 years
Debugging stuff 🧐with IDA & Unicorn: [uEmu]: Emulation started [uEmu]: Breakpoint reached at 0x463D0 : SVC 0 [uEmu]: ! <U> Unable to emulate [ SVC 0 ] - SKIP to 0x463D4 [uEmu]: Breakpoint reached at 0x46400 : B.EQ loc_4254C @unicorn_engine https://t.co/aAGCtC15vU
1
3
14