Unicorn Engine (@unicorn_engine) 's Twitter Profile
Unicorn Engine

@unicorn_engine

The Ultimate CPU Emulator. Also see our related frameworks @capstone_engine, @keystone_engine

ID: 3236831755

linkhttp://www.unicorn-engine.org calendar_today05-06-2015 08:57:44

1,1K Tweet

6,6K Followers

20 Following

Eduardo Novella (@enovella_) 's Twitter Profile Photo

Debugging stuff 🧐with IDA & Unicorn: [uEmu]: Emulation started [uEmu]: Breakpoint reached at 0x463D0 : SVC 0 [uEmu]: ! <U> Unable to emulate [ SVC 0 ] - SKIP to 0x463D4 [uEmu]: Breakpoint reached at 0x46400 : B.EQ loc_4254C Unicorn Engine github.com/alexhude/uEmu

Ptrace Security GmbH (@ptracesecurity) 's Twitter Profile Photo

Dumpulator - An Easy-To-Use Library For Emulating Memory Dumps. Useful For Malware Analysis (Config Extraction, Unpacking) And Dynamic Analysis In General (Sandboxing) kitploit.com/2023/05/dumpul… #Pentesting #CyberSecurity #Infosec

Dumpulator - An Easy-To-Use Library For Emulating Memory Dumps. Useful For Malware Analysis (Config Extraction, Unpacking) And Dynamic Analysis In General (Sandboxing) kitploit.com/2023/05/dumpul…  #Pentesting #CyberSecurity #Infosec
Mobile Security (@mobilesecurity_) 's Twitter Profile Photo

Emulating Android native library to decrypt strings using Qiling Framework #MobileSecurity #AndroidSecurity [VIDEO] by FatalSec youtu.be/R1zWh3fbY24

Behrang Fouladi (@behrangfouladi) 's Twitter Profile Photo

I have published a tutorial on writing an emulator using the Unicorn Engine for security testing custom radio protocols on Nordic Semiconductor SoCs. github.com/befoulad/nrf52… video: youtube.com/playlist?list=… #IIoT #security #nrf52840

Verichains (@verichains) 's Twitter Profile Photo

Just In! Our TSSHOCK paper acceptance into Black Hat, the premier cybersecurity conference! #BHUSA Join our researchers in Vegas this August, as we will share in this briefing our critical 0-day attacks on MPC vaults and wallets. Brief notice here: blackhat.com/us-23/briefing…

Just In! 
Our TSSHOCK paper acceptance into <a href="/BlackHatEvents/">Black Hat</a>, the premier cybersecurity conference!
#BHUSA Join our researchers in Vegas this August, as we will share in this briefing our critical 0-day attacks on MPC vaults and wallets.

Brief notice here: blackhat.com/us-23/briefing…
Qiling Framework (@qiling_io) 's Twitter Profile Photo

After 8 long months. Version 1.4.6 is being tagged. update your code: pip3 install qiling --upgrade github.com/qilingframewor…

Lazymio (@pwnedmio) 's Twitter Profile Photo

packages.ubuntu.com/lunar/libunico… packages.debian.org/bookworm/libun… Finally, it's time to install Unicorn Engine on Debian/Ubuntu with apt!

Thanh Nguyen (@redragonvn) 's Twitter Profile Photo

1/ After #TSSHOCK #MPC mass pwned, it's now #ZKP's turn. We've reported a Critical Proof Forgery Attack, allows anyone with access to an aggregator, to steal funds from a top #zkEVM Layer-2. Unsurprisingly, vendor's reply: '..not exploitable by anyone due to centralization'!!?

1/ After #TSSHOCK #MPC mass pwned, it's now #ZKP's turn. We've reported a Critical Proof Forgery Attack, allows anyone with access to an aggregator, to steal  funds from a top #zkEVM Layer-2. Unsurprisingly,  vendor's reply: '..not exploitable by anyone due to centralization'!!?
Thanh Nguyen (@redragonvn) 's Twitter Profile Photo

2/ This remind me of the response from CEO of #Multichain after we reported critical #MPC #vulnerabilities. It was later found out that all MPC 'trusted nodes' were actually run under the his personal cloud account and the #bridge got #hacked eventually! x.com/MultichainOrg/…

2/ This remind me of the response from CEO of #Multichain after we reported critical #MPC #vulnerabilities. It was later found out that all MPC 'trusted nodes' were actually run under the his personal cloud account and the #bridge got #hacked eventually! x.com/MultichainOrg/…
Thanh Nguyen (@redragonvn) 's Twitter Profile Photo

3/ Reporting bugs directly to vendor or via #bugbounty are both painful. For example, #THORChain stopped responding to our emails after receiving full POC & paper. Even though they had halted the chain globally due to our report x.com/WuBlockchain/s…

Thanh Nguyen (@redragonvn) 's Twitter Profile Photo

4/ We've now opted to directly inform the public about the potential #risks instead. It's also important to remember that ##MPC and #ZKP are relatively new and complex protocols, making them susceptible to #vulnerabilities. Stay tuned for more MPC/ZKP #bugs releases from us!

John Hammond (@_johnhammond) 's Twitter Profile Photo

FAST malware analysis with binary emulation! Anuj Soni taught me a ton of sweet stuff going through a Qakbot sample, Cobalt Strike and more using emulation frameworks like Unicorn and Qiling... seriously super cool, huge thanks to Anuj for showcasing! youtu.be/b5-oTMcBJQ0

FAST malware analysis with binary emulation! <a href="/asoni/">Anuj Soni</a> taught me a ton of sweet stuff going through a Qakbot sample, Cobalt Strike and more using emulation frameworks like Unicorn and Qiling... seriously super cool, huge thanks to Anuj for showcasing! youtu.be/b5-oTMcBJQ0
Wolfgang Grieskamp (@wgrieskamp) 's Twitter Profile Photo

The Move decompiler developed in collaboration by Verichains and Aptos Labs is a game changer for the security on the Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! aptoslabs.medium.com/move-revealed-…

Verichains (@verichains) 's Twitter Profile Photo

🤝 We’re thrilled to partner with @Aptos_Labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: github.com/verichains/rev…   Revela is also