Unicorn Engine @unicorn_engine
The Ultimate CPU Emulator. Also see our related frameworks @capstone_engine, @keystone_engine unicorn-engine.org Joined June 2015-
Tweets1K
-
Followers6K
-
Following22
-
Likes879
🤝 We’re thrilled to partner with @aptos_labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: github.com/verichains/rev… Revela is also…
🤝 We’re thrilled to partner with @aptos_labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: github.com/verichains/rev… Revela is also…
The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! aptoslabs.medium.com/move-revealed-…
FAST malware analysis with binary emulation! @asoni taught me a ton of sweet stuff going through a Qakbot sample, Cobalt Strike and more using emulation frameworks like Unicorn and Qiling... seriously super cool, huge thanks to Anuj for showcasing! youtu.be/b5-oTMcBJQ0
2/ This remind me of the response from CEO of #Multichain after we reported critical #MPC #vulnerabilities. It was later found out that all MPC 'trusted nodes' were actually run under the his personal cloud account and the #bridge got #hacked eventually! x.com/multichainorg/…
2/ This remind me of the response from CEO of #Multichain after we reported critical #MPC #vulnerabilities. It was later found out that all MPC 'trusted nodes' were actually run under the his personal cloud account and the #bridge got #hacked eventually! x.com/multichainorg/… https://t.co/g3kSfHZAUT
3/ Reporting bugs directly to vendor or via #bugbounty are both painful. For example, #THORChain stopped responding to our emails after receiving full POC & paper. Even though they had halted the chain globally due to our report x.com/wublockchain/s…
3/ Reporting bugs directly to vendor or via #bugbounty are both painful. For example, #THORChain stopped responding to our emails after receiving full POC & paper. Even though they had halted the chain globally due to our report x.com/wublockchain/s…
4/ We've now opted to directly inform the public about the potential #risks instead. It's also important to remember that ##MPC and #ZKP are relatively new and complex protocols, making them susceptible to #vulnerabilities. Stay tuned for more MPC/ZKP #bugs releases from us!
packages.ubuntu.com/lunar/libunico… packages.debian.org/bookworm/libun… Finally, it's time to install @unicorn_engine on Debian/Ubuntu with apt!
Limited space left!
After 8 long months. Version 1.4.6 is being tagged. update your code: pip3 install qiling --upgrade github.com/qilingframewor…
Our very first training. DM me if you need a discount coupon.
Our very first training. DM me if you need a discount coupon.
Just In! Our TSSHOCK paper acceptance into @BlackHatEvents, the premier cybersecurity conference! #BHUSA Join our researchers in Vegas this August, as we will share in this briefing our critical 0-day attacks on MPC vaults and wallets. Brief notice here: blackhat.com/us-23/briefing…
Capstone 5.0 is out! capstone-engine.org/Version-5.0 Cc @Angrz3_K
It is nice to see Unicorn used there :-)
I have published a tutorial on writing an emulator using the @unicorn_engine for security testing custom radio protocols on @NordicTweets SoCs. github.com/befoulad/nrf52… video: youtube.com/playlist?list=… #IIoT #security #nrf52840
Dumpulator - An Easy-To-Use Library For Emulating Memory Dumps. Useful For Malware Analysis (Config Extraction, Unpacking) And Dynamic Analysis In General (Sandboxing) kitploit.com/2023/05/dumpul… #Pentesting #CyberSecurity #Infosec
Emulating Android native library to decrypt strings using Qiling Framework #MobileSecurity #AndroidSecurity [VIDEO] by @SecFatal youtu.be/R1zWh3fbY24
Debugging stuff 🧐with IDA & Unicorn: [uEmu]: Emulation started [uEmu]: Breakpoint reached at 0x463D0 : SVC 0 [uEmu]: ! <U> Unable to emulate [ SVC 0 ] - SKIP to 0x463D4 [uEmu]: Breakpoint reached at 0x46400 : B.EQ loc_4254C @unicorn_engine github.com/alexhude/uEmu
Package Binary Code as a Python class using Binary Ninja and Unicorn Engine github.com/pbiernat/ripr #Pentesting #Python #CyberSecurity #Infosec
Plugin Highlight: ripr Author: Patrick Biernat @ ret2 github.com/pbiernat/ripr Have you ever wanted to run a pure function to play with its inputs and outputs to determine what it does? Enter ripr. Using unicorn on the backend, it even supports multiple architectures!
Brendan Dolan-Gavitt @moyix
25K Followers 6K Following Associate Professor @ NYU Tandon. Security, RE, ML. PGP https://t.co/3WXr0RfRkv Founder of the MESS Lab: https://t.co/zGycrX3Gmn "an orc smiling into the camera" — CLIPLiveOverflow 🔴 @LiveOverflow
142K Followers 1K Following wannabe hacker... he/him 🌱 grow your hacking skills @hextreeioPtrace Security GmbH @ptracesecurity
53K Followers 883 Following Empowering IT Security Professionals through Hands-On Online Courses.Saar Amar @AmarSaar
18K Followers 362 Following Reversing, exploits, {Windows, Hyper-V, *OS} internals, mitigations. Apple SEAR. Opinions are my own. @[email protected]Richard Johnson @richinseattle
16K Followers 3K Following Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ https://t.co/mloVP6rPB7; hacking the planet since 1995; Undercurrents BOFHStephen Sims @Steph3nSims
20K Followers 601 Following Perpetual Student | SANS Fellow | Musician | Braggart Hater | Gray Hat Hacking | VR | 🏂 | d3adc0de | oNLyHaCKeRs | https://t.co/CadJehomsUSynacktiv @Synacktiv
17K Followers 277 Following Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.Mobile Security @mobilesecurity_
31K Followers 1K Following Mobile Security ✌🏻 #MobileSecurity #AndroidSecurity #iOSsecurityhasherezade @hasherezade
84K Followers 845 Following Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)Joxean Koret (@joxean.. @matalaz
8K Followers 4K Following سمووحخ ̷̴̐ خ ̷̴̐ خ ̷̴̐ خ امارتيخ ̷̴̐ خ 巴斯克恐怖 జ్ఞffective.Power لُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ 冗జ بٍٍٍٍََُُُِّّّْرٍٍٍٍََُُِِّّّْآٍٍٍَُّ🦠بٍٍٍٍََُُُِّّّْرٍٍٍٍََُُِςεяβεяμs - м�.. @c3rb3ru5d3d53c
21K Followers 235 Following 💕 Malware Hunter Killer 💕 #binlex & #mwcfg Developer 📽️ YouTuber 👩💻 She/Her 💍@DravenSwiftbow Support my work 👇 ☕️ https://t.co/SfTI8uJa23Thomas Roccia 🤘 @fr0gger_
25K Followers 2K Following Sr. Threat Researcher @Microsoft, Malware Warlock, Threat Intel, Python🧡- Former @McAfee_labs, Goon @Defcon, Creator of #UnprotectProject - Tweets are my ownkmkz @kmkz_security
18K Followers 1K Following Offensive Security fanatic, Offsec Team lead... pom-pom girl? Who fuckin' cares ??PwnFunction @PwnFunction
38K Followers 981 Following I make animated computer science videos • product & ai @pdiscoveryio • blog at https://t.co/RLiSNOVQ0WFrida @fridadotre
13K Followers 2K Following Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.Satoshi Tanda @standa_t
7K Followers 358 Following Engineer & Trainer. My DM is open. https://t.co/hqylaDLtNvRomain THOMAS @rh0main
4K Followers 968 Following Security engineer working on Android, reverse-engineering & obfuscation. Author of @LIEF_project and @open_obfuscatorRicklee @usricklee
802 Followers 5K FollowingEzV01D @EzV01d
30 Followers 327 FollowingRussell Willis @codinguy
70 Followers 307 Following 30+ years professionally making and breaking software. *BSD, Linux and Windows, in that order. Opinions are my own and not that of my employer.Parrot @Parrot_EN
0 Followers 1K Followingbl4nk @kbblankme
0 Followers 194 FollowingHans Fischer @HansFischer4368
0 Followers 98 Following Infosec, Entrepreneur, Lifestyle Coach, Food Enjoyer, Business Angel, Web Surfer, Air Breather, Author, Philantropist, CEO of Cyber, Artist, Crypto Investorluksamuk @luksamuk
0 Followers 111 Following Lisp hacker. Account recreated mainly as a placeholder. Follow me on Mastodon: @[email protected]wma @wma314
56 Followers 2K FollowingNaman Devnani @naman_devnani
332 Followers 5K Following Security Researcher | Purple Team | Bug Hunter | CTF Player | Science & Tech Enthusiast | R&D | All-Source Intelligence | CAP | DCSP | TTIA | BCDEshuaibibobo @shuaibiboboone
0 Followers 5 FollowingError403 @2rr0r4o3
40 Followers 350 Followinghamsterruby @hamsterrubyy
0 Followers 486 FollowingSeglon @Seglon_
2 Followers 21 FollowingVadivel @v7441767
117 Followers 410 Following Web Developer, Security Researcher, Whitehat hacker ;-)Pointed Zero @Zero2All_
15 Followers 108 Following121 @121Beyond
29 Followers 787 FollowingMETASPORTSFUMEZ.COM @metasportsfumez
280 Followers 3K Following I'm just a hacker, not a very good one, trying to save the world. ✨💖✨Ted Turich @TTedFoxx
1K Followers 5K Following All things Cyber Security! Advocate for Security-Focused, Security-Centric Solutions. Ex-Zscaler, Ex-Cyren.Olasunkanmi Abdullahi @Olasunkanm13242
38 Followers 222 FollowingS19 @d9eger
0 Followers 5K FollowingQWERTY @QWERTYRBG
335 Followers 3K Following박명훈 @mhun512
53 Followers 519 FollowingNghĩa Võ @realm3k4
14 Followers 41 Following | Cybersecurity | Reversing | HCMUS Student | https://t.co/nz7UHPh3Tr0x00cleric @0x00cleric
12 Followers 173 Followingjason @jason41244
29 Followers 189 FollowingDD X @DDX1096598
8 Followers 19 FollowingHussain Alqurashi @qurashi_hm
125 Followers 3K FollowingBarre Dijkstra @barredijkstra
420 Followers 1K Following software dev/mgmt, teaching offsec/re, csirt @DIVDnl, re/vx hobbyist, CTFs, salp at infosec.exhange and bsky he/him #HackingIsNotACrimeKevin.m @klmitchell212
485 Followers 1K Following Mobile Security @Amazon | prev: iOS Engineer (@Accenture, @StateFarm, @Allstate) | GH: klmitchell2lostit @lostit_dev
1 Followers 84 Followingishy ツ @ishanmarikar
315 Followers 4K Following #adhd. he/him. learning data science. at @teamwatchdog. aspiring (skill) hoarder. putting the 'fun' in 'dysfunction'.Layne Wesley @Layne_Wesley_X
68 Followers 420 Followingfeidingnaodddddddd @feidingnao60071
19 Followers 20 Followingzer0day @ahmed_hassan__0
541 Followers 2K Following Bug Hunter🐞| Penetration Tester 🤖 CCNP | eCPPT| OSCP | eWPTv2 🔝1% On TryHackMe💻GossipSec @gossipsec
90 Followers 794 Following吃一口苹果 @LK9307
41 Followers 369 Followingjzz @_jzz__
0 Followers 47 Following0xor0ne @0xor0ne
55K Followers 526 Following | CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | My Tweets, My Opinions :) |Binni Shah @binitamshah
132K Followers 175 Following Linux Evangelist, Malwares , Security Enthusiast, Philanthropist , Reformist , Jain. binitamshah at protonmail dot comTrail of Bits @trailofbits
32K Followers 247 Following We help secure the world’s most targeted organizations and products. We combine security research with an attacker mentality to reduce risk and fortify code.Alex Matrosov @matrosov
18K Followers 2K Following 🔬Founder & CEO @Binarly_io, #codeXplorer, #efiXplorer, @REhints and "Rootkits and Bootkits" book. Previously worked at Nvidia, Cylance, Intel, ESET, Yandex.Verichains @Verichains
4K Followers 81 Following A leading blockchain security firm with 200++ clients, $50 billion assets under protection and trusted by top clients such as BNB, Klaytn, Axie Infinity, Wemix.Nikolaj Schlej @NikolajSchlej
4K Followers 86 Following Firmware Security Engineer https://t.co/HQjk1Q007KItay Cohen🌱 @megabeets_
5K Followers 488 Following Animal liberation activist & Reverse Engineer 🌟 Forbes 30 Under 30 • Maintainer of Cutter and Rizin • Leading Research @ Check Point • I don't eat animals.TxPipe @txpipe_tools
4K Followers 443 Following #OpenSource tools and infrastructure for #Cardano blockchain developers. We focus on integrating on-chain data with off-chain infrastructure.Galois @galois
6K Followers 699 Following Galois applies cutting edge computer science and mathematics to solve difficult technological problems.OpShin | Python SCs @OpShinDev
3K Followers 68 Following Cardano Smart Contracts in Python. You want it. You buidl it. $opshinLinux Kernel Security @linkersec
6K Followers 0 Following Links related to Linux kernel security and exploitation. Maintained by @andreyknvl and @a13xp0p0v. Also on https://t.co/GVE11dpBb8 and https://t.co/YpxPWXnA6Z.Long on Minswap @ngnlong
2K Followers 308 Following Co-founder & Lead Engineer @minswapdex. prev. @awscloud, @anduintransact, @gsoc, @jenkinsci. Opinions are my own.Hachi Security @HachiSecurity
144 Followers 0 Following Functional Security Tools for Smart ContractsClaudiu-Vlad Ursache @ursachec
616 Followers 559 Following software engineer & security researcher @binarly_io developer @joernioGroundX @groundx_io
134 Followers 4 Following Where we build @capstone_engine, @unicorn_engine, @keystone_engine & a lot more ...Sebastian Muniz @_topo
2K Followers 804 Following Security researcher, hardware crasher and some other useless characteristics in real life.Keystone Engine @keystone_engine
3K Followers 6 Following The Ultimate Assembler Framework. Also see our related frameworks @capstone_engine & @unicorn_engineTim Strazzere @timstrazz
8K Followers 362 Following Mobile, Drone & (automated) Vehicle Security Researcher and Malware Analyst, Tweets are my own not my employersw~ @wind4k
422 Followers 290 Following daily developer, cs dreamer, security and CTF for fun, https://t.co/1tDCIrha5s / CLGT crews, https://t.co/xO0u91nLgG author & maintainerCapstone Engine @capstone_engine
7K Followers 124 Following The Ultimate Disassembler Framework. Also see our related frameworks @unicorn_engine, @keystone_engineIntegrating the excellent @Verichains Move decompiler--huge step for code transparency in the Sui ecosystem. Check it out!
🔍 Code Decompiler arrives on #SuiVision! Our commitment to transparency for developers and users just got stronger. It brings @SuiNetwork Code transparent by converting bytecode into readable source code. Special thanks to @b1ackd0g for the insights and step-by-step guides. 🌟…
Today we're celebrating a HUGE milestone. Binarly has closed a $10.5 million seed round led by @twobearcapital, with participation from @Blu_Venture @canaanpartners, @Cisco_Invests, and @Liquid2V. Thank YOU all for investing in the future of firmware and software supply chain…
Wrote a simple fake Telnet server compatible with Mirai - it will be detected as a vulnerable target and the malware will report it to the scan listener server. gist.github.com/nezza/34b89eb6…
@aptos_labs has released Revela Decompiler, the pioneering open-source tool to decompile Move bytecode, now on Verichains GitHub and online. It marks a major advancement in blockchain technology, transforming development on Aptos. This tool is a game-changer for developers 🔥
🤝 We’re thrilled to partner with @aptos_labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: github.com/verichains/rev… Revela is also…
We, @AptosLabs, will be at @nullcon Berlin for the 3rd edition of the event. Our partner @Verichains is going to present the #MOVE decompiler, publicly announced last week. nullcon.net/berlin-2024/sp… #NullConBerlin2024 P.S. We got some stickers 🐞👀
Security is typically prioritized before pre-deployment, hence the need for security audits. This is one of the few web3 tools that prioritizes security post deployment. In the case of a security incident on deployed Move contract, SRs can efficiently analyze discrepancies.
ICYMI: The Move Revela tool, developed in collaboration by @Verichains and @AptosLabs, is a game changer for the security on the @Aptos network. Revela enables builders to swiftly, securely, and simply convert any bytecode deployed on-chain back to source code—only possible with…
This is by far one of the coolest web3 tools out 🔥 To any Move auditors, I HIGHLY encourage you to leverage Revela on any upcoming audits. I'll be documenting my experience w/ it on couple of Aptos and Sui Move audits here soon. Stay toon'd 😎
The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! aptoslabs.medium.com/move-revealed-…
im spending my afternoon reading aptos contracts - 100% of aptos contracts were open-sourced today previously, most aptos contracts were closed-source (econia a notable exception). today @Aptos @Verichains released revela, a move-bytecode decompiler. you can read the…
Excited to announce the partnership between @Verichains and @aptos_labs in launching the Revela Decompiler, the open source solution capable of decompiling Move byte-code to its original source code. This is a game changer for the security on Move-based blockchain.
🤝 We’re thrilled to partner with @aptos_labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: github.com/verichains/rev… Revela is also…
Very cool. Can confirm this will work on other chains that use Move. Until bytecodes diverge that is, which is soon by the looks of it...
🤝 We’re thrilled to partner with @aptos_labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: github.com/verichains/rev… Revela is also…
🤝 We’re thrilled to partner with @aptos_labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: github.com/verichains/rev… Revela is also…
The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! aptoslabs.medium.com/move-revealed-…
Elevating @Aptos security and transparency! Revela, the first Move decompiler by @Verichains and @AptosLabs brings unparalleled clarity to on-chain code, enabling anyone to convert bytecode back to source. A significant step toward open, secure and auditable web3 development
The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! aptoslabs.medium.com/move-revealed-…
The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! aptoslabs.medium.com/move-revealed-…
FAST malware analysis with binary emulation! @asoni taught me a ton of sweet stuff going through a Qakbot sample, Cobalt Strike and more using emulation frameworks like Unicorn and Qiling... seriously super cool, huge thanks to Anuj for showcasing! youtu.be/b5-oTMcBJQ0
Still tinkering a bit with retrowin32. Having trouble pinning down a case where Rosetta runs a demo right and my own emulator doesn't. The newest bit: support for @unicorn_engine, which is basically a library form of QEMU, for x86 emulation. Hoping to triangulate.
Thrilled to announce the release of Hakuin - a blazing fast framework for Blind SQL Injection optimization and automation. github.com/pruzko/hakuin Hakuin made it to this year's @wootsecurity and @HITBSecConf. #HITB2023HKT, #woot23 Special thanks to @capstone_engine.
packages.ubuntu.com/lunar/libunico… packages.debian.org/bookworm/libun… Finally, it's time to install @unicorn_engine on Debian/Ubuntu with apt!
@capstone_engine @lcheylus @Angrz3_K That is a great news. As @capstone_engine is leveraged by many projects.
"Revolutionizing ELF binary patching with Shiva" DEFCON talk: forum.defcon.org/node/245723
Capstone 5.0 is out! capstone-engine.org/Version-5.0 Cc @Angrz3_K