Unicorn Engine
@unicorn_engine
Followers
6K
Following
833
Media
31
Statuses
1K
The Ultimate CPU Emulator. Also see our related frameworks @capstone_engine, @keystone_engine
Joined June 2015
We are happy to announce that Unicorn Engine was awarded by @alibaba_cloud for its impact on the cybersecurity field! https://t.co/buwL9amTni
0
1
11
Building a small x86 CPU emulator with @rustlang and the awesome @unicorn_engine and #iced_rs. Do I have a chance to run this on the web?
0
1
7
I'm working on a Visual Debugger for Assembly (x86, arm and other major archs.) which is going to be cross platform and FOSS Demo video link in post below cc @_buildspace @_nightsweekends
1
5
25
🤝 We’re thrilled to partner with @Aptos_Labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: https://t.co/O6yqL2A5aP Revela is also
github.com
Decompiler for Move smart contracts. Contribute to verichains/revela development by creating an account on GitHub.
The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! https://t.co/bauJqxCgwY
4
17
47
The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! https://t.co/bauJqxCgwY
medium.com
by Verichains and Aptos Labs
11
24
104
FAST malware analysis with binary emulation! @asoni taught me a ton of sweet stuff going through a Qakbot sample, Cobalt Strike and more using emulation frameworks like Unicorn and Qiling... seriously super cool, huge thanks to Anuj for showcasing! https://t.co/PhYxUxaMm9
6
57
228
2/ This remind me of the response from CEO of #Multichain after we reported critical #MPC #vulnerabilities. It was later found out that all MPC 'trusted nodes' were actually run under the his personal cloud account and the #bridge got #hacked eventually! https://t.co/4apCYJBJtY
1. On May 21, 2023, Multichain CEO Zhaojun was taken away by the Chinese police from his home and has been out of contact with the global Multichain team ever since. The team contacted the MPC node operators and learned that their operational access keys to MPC node servers had
1
2
4
3/ Reporting bugs directly to vendor or via #bugbounty are both painful. For example, #THORChain stopped responding to our emails after receiving full POC & paper. Even though they had halted the chain globally due to our report
THORChain: There are claims of a potential vulnerability with a THORChain dependency that may affect THORChain. Out of an abundance of caution, steps have been taken to halt THORChain globally. THORChain is a settlement layer that facilitates swaps between 8 chains.
0
1
4
4/ We've now opted to directly inform the public about the potential #risks instead. It's also important to remember that ##MPC and #ZKP are relatively new and complex protocols, making them susceptible to #vulnerabilities. Stay tuned for more MPC/ZKP #bugs releases from us!
0
2
6
https://t.co/CZykUw7IZx
https://t.co/at3fVsjy5E Finally, it's time to install @unicorn_engine on Debian/Ubuntu with apt!
0
1
4
Limited space left!
Join @onlyxwings at #HITB2023HKT to discover bugs in IoT devices with the Qiling Framework. Learn standard workflows and leverage Qiling's capabilities for efficient emulation. Register at https://t.co/76cSjUwDQH
#IoTsecurity #QilingFramework
0
2
3
After 8 long months. Version 1.4.6 is being tagged. update your code: pip3 install qiling --upgrade https://t.co/szICsMd8ri
github.com
What's Changed Fix ELF argv encoding by @elicn in #1303 Qdb improvements by @ucgJhe in #1311 added a history tracker to get coverage information about the execution of the binary by @anotherdi...
0
2
7
Our very first training. DM me if you need a discount coupon.
Join @onlyxwings at #HITB2023HKT to discover bugs in IoT devices with the Qiling Framework. Learn standard workflows and leverage Qiling's capabilities for efficient emulation. Register at https://t.co/76cSjUwDQH
#IoTsecurity #QilingFramework
0
1
3
Just In! Our TSSHOCK paper acceptance into @BlackHatEvents, the premier cybersecurity conference! #BHUSA Join our researchers in Vegas this August, as we will share in this briefing our critical 0-day attacks on MPC vaults and wallets. Brief notice here: https://t.co/1xb8tf93OX
0
5
14
Capstone 5.0 is out! https://t.co/fsU1G2nlLU Cc @Angrz3_K
3
40
86
It is nice to see Unicorn used there :-)
I've put together a new blog post! This one re-treads @bl4sty's earlier AMLogic research but takes my own approach to exploit development, with an 'alternative' vulnerability and an emulator. Just for fun! https://t.co/ZjNFniOjz9
0
0
2
I have published a tutorial on writing an emulator using the @unicorn_engine for security testing custom radio protocols on @NordicTweets SoCs. https://t.co/XtYyJBxFBq video: https://t.co/gfcLl6rFWj
#IIoT #security #nrf52840
github.com
nRF52840 emulator to run and test custom radio protocols - befoulad/nrf52_radio_emu
0
5
16
Dumpulator - An Easy-To-Use Library For Emulating Memory Dumps. Useful For Malware Analysis (Config Extraction, Unpacking) And Dynamic Analysis In General (Sandboxing) https://t.co/Uxa0qA0NdM
#Pentesting #CyberSecurity #Infosec
0
15
55
Emulating Android native library to decrypt strings using Qiling Framework #MobileSecurity #AndroidSecurity [VIDEO] by @SecFatal
https://t.co/1RUbU56xvs
0
21
76
Debugging stuff 🧐with IDA & Unicorn: [uEmu]: Emulation started [uEmu]: Breakpoint reached at 0x463D0 : SVC 0 [uEmu]: ! <U> Unable to emulate [ SVC 0 ] - SKIP to 0x463D4 [uEmu]: Breakpoint reached at 0x46400 : B.EQ loc_4254C @unicorn_engine
https://t.co/aAGCtC15vU
1
3
14