Miasm (@miasmre) 's Twitter Profile
Miasm

@miasmre

ID: 4904517291

linkhttp://miasm.re calendar_today13-02-2016 12:22:10

70 Tweet

925 Takipçi

5 Takip Edilen

Ignacio Sanmillan (@ulexec) 's Twitter Profile Photo

I wrote a part 1 of a 2 part series of articles portraying my experience with Yuma Kurogome’s comprehensive course on Advance Binary Deobfuscation with Miasm. I introduced some radare aswell :) ulexec.github.io/ulexec.github.…

Miasm (@miasmre) 's Twitter Profile Photo

The development of the #rust version of Miasm is ongoing 😉 Using PyO3 to expose python bindings compatible with current scripts!

The development of the #rust version of Miasm is ongoing 😉
Using PyO3 to expose python bindings compatible with current scripts!
Adrien Guinet (@adriengnt) 's Twitter Profile Photo

Emulating the NotPetya bootloader with Miasm, an article by @la_F0uin3 and myself, translated from an article originally published in MISCmag : aguinet.github.io/blog/2020/08/2… Code available here: github.com/aguinet/miasm-…

Emulating the NotPetya bootloader with <a href="/MiasmRe/">Miasm</a>, an article by @la_F0uin3 and myself, translated from an article originally published in <a href="/MISCRedac/">MISCmag</a> :

aguinet.github.io/blog/2020/08/2…

Code available here: github.com/aguinet/miasm-…
Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

Friday, 19:00 GMT+2 at #r2con2020: In a live coding, I will use Cutter moved to Rizin → @cutter_re and Miasm to automatically identify and remove opaque predicates in an APT malware sample. Check it out: rada.re/con/2020/youtu…

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

A good example of automatic code deobfuscation based on pattern matching is stadeo by ESET. They use Miasm to automatically remove control flow flattening for the stantinko malware family. github.com/eset/stadeo

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

If you want to learn more about control-flow graph construction, analysis and loop detection, check out my slide deck. I also wrote a blog post on how these concepts can be easily explored with Miasm. synthesis.to/2021/03/15/con…

Miasm (@miasmre) 's Twitter Profile Photo

Congratulation, you both succeeded in: - resolving the challenge - writing a great tutorial on how to add a custom architecture in Miasm & exploit the IR!

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

Giving the workshop on code deobfuscation was great fun. Thanks for your active participation! #HITB2021AMS Check out code, slides and samples here: github.com/mrphrazer/hitb…

Giving the workshop on code deobfuscation was great fun. Thanks for your active participation! #HITB2021AMS

Check out code, slides and samples here: github.com/mrphrazer/hitb…
Hash Miser (@h_miser) 's Twitter Profile Photo

I finally decided to publish my complete toolset written for Tinynuke analysis You'll find config and injects grabber, dll extractors, Ghidra deobfuscation scripts and CEA IT Security miasm based scripts github.com/Heat-Miser/tin… #Tinynuke #ReverseEngineering #Malware

Miasm (@miasmre) 's Twitter Profile Photo

Little update: based on the great NCC Group Research & Technology blog post (research.nccgroup.com/2021/10/12/a-l…), we added color support for IR and ASM graph output: Thank you guys !

Little update: based on the great <a href="/NCCGroupInfosec/">NCC Group Research & Technology</a> blog post (research.nccgroup.com/2021/10/12/a-l…), we added color support for IR and ASM graph output: Thank you guys !
ESET Research (@esetresearch) 's Twitter Profile Photo

While there are several frameworks for #reverseengineering that provide features we needed to see through Wslink’s virtual-machine-based obfuscator, we used Miasm in this project simply because it’s actively maintained and we’re already familiar and satisfied with it. 4/5