Linking pages
- Romain Thomas https://www.romainthomas.fr/post/21-07-pokemongo-anti-frida-jailbreak-bypass/ 15 comments
- GitHub - REMath/literature_review: Survey of program analysis research with a focus on machine code https://github.com/REMath/literature_review 0 comments
- Spectre is not a Bug, it is a Feature https://blog.quarkslab.com/spectre-is-not-a-bug-it-is-a-feature.html 0 comments
- Exploiting MS16-145: MS Edge TypedArray.sort Use-After-Free (CVE-2016-7288) http://blog.quarkslab.com/exploiting-ms16-145-ms-edge-typedarraysort-use-after-free-cve-2016-7288.html 0 comments
- Symbolic Deobfuscation: From Virtualized Code Back to the Original (DIMVA 2018) https://blog.quarkslab.com/symbolic-deobfuscation-from-virtualized-code-back-to-the-original-dimva-2018.html 0 comments
- writeups/README.md at master · jeffli678/writeups · GitHub https://github.com/jeffli678/writeups/blob/master/obfuscation/README.md#solving-an-obfuscated-crackme-with-binaryninja-and-triton 0 comments
- Moving From Dynamic Emulation of UEFI Modules To Coverage-Guided Fuzzing of UEFI Firmware - SentinelLabs https://labs.sentinelone.com/moving-from-dynamic-emulation-of-uefi-modules-to-coverage-guided-fuzzing-of-uefi-firmware/ 0 comments
- GitHub - rshipp/awesome-malware-analysis: Defund the Police. https://github.com/rshipp/awesome-malware-analysis 0 comments
- GitHub - CIFASIS/nosy-newt: Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton https://github.com/CIFASIS/nosy-newt 0 comments
Related searches:
Search whole site: site:triton.quarkslab.com
Search title: Triton: A dynamic binary analysis library
See how to search.