#SymbolicExecution

2025-09-12

Did a presentation today on #symbolicexecution and demo'd some of the fine work by #angr as well as some interesting results from the #vsharp team. Not totally sure how the talk went with the audience; but, I'm trying to decide if I want to make some changes & maybe I put in for the Cactus Con CFP which is currently open.

I think idea be interested in showing some reversing analyses like deobfuscating some obfuscated malware maybe? I'm not sure if my skill with some of these tools is quite there yet though.

2025-07-29

Still waiting for the call for paper for Tests and Proofs (TAP) conference? Wait no longer: we are thrilled to announce that TAP is now a track at FM 2026: conf.researchr.org/track/fm-20

#FormalMethods #SoftwareTesting #Verification #Proof #SymbolicExecution #FM2026 #TAP2026

hubertfhubertf
2025-07-19

After reading angr docs for the better part of the day, I was able to solve OverTheWire's Leviathan levels 1->2 and 6->7. Not 3->4 so far, but that's left for tomorrow. It's definitely an exciting journey!

Wanna join in? Read up at docs.angr.io/en/latest/ and drop me a line!

2025-02-22

Symbolic Execution is powerful technique that explores all possible execution paths without actual inputs. An interesting display of this technique is below:

doar-e.github.io/blog/2014/10/

#malware #reverseengineering #cybersecurity #infosec #symbolicexecution

2023-07-21

πŸ’ͺ #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets", and learn how to perform symbolic and concolic execution with angr!

🎟️ ringzer0.training/trainings/sy

Symbolic Execution with angr on Real-world targets, by Jeremy Blackthorne, Aug 05-08, The Palms, Las Vegas
Joxean Koret (@matalaz)joxean
2023-07-14

Also, of even small is very slow and would only, probably, help for comparing binaries for the same (or compatible) architecture. And in order to compare binaries for the same architectures you have a myriad of different, not terribly slow, ways for doing .

Joxean Koret (@matalaz)joxean
2023-07-14

Dear everyone in the academia (and maybe elsewhere) doing research: does not work for comparing different architectures, unless you are using as input for your symbolic execution tool *decompiled code*.

If you are using assembly or using an IR (Intermediate Representation) based on assembler (like Ghidra' p-code, IDA's microcode, LLVM's IR, etc), it will inevitably produce different outputs.

Your best IR for is pseudo-code, the 's output.

2023-07-08

πŸ’ͺ #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets", and learn how to perform symbolic and concolic execution with angr!

🎟️ ringzer0.training/trainings/sy

Symbolic Eecution with Angr on Real-World Targets
2023-06-22

πŸ’ͺ #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets". Get your ticket now!

🎟️ ringzer0.training/trainings/sy

Symbolic Execution with angr on Real-World Targets, by Jeremy Blackthorne, Aug 05-08, The Palms, Las Vegas
2023-06-06

πŸ’ͺ #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets". Get your ticket now!

🎟️ ringzer0.training/trainings/sy

Symbolic Execution with angr on Real-World Targets, Jeremy Blackthorne, aug 05-08, The Palms, Las Vegas
2023-02-23

πŸ“’ Don’t forget to sign up for one of our advanced hands-on #infosec trainings! The final week of #RETURN23XPLOIT is only a few days away. Our trainings offer hands-on instruction from top industry experts. Learn all about #Ventura #Exploitation, #SymbolicExecution, #ReverseEngineering, #Cryptography & more. Don't miss out - register now!

ringzer0.training/

#cybersecurity #training

An overview of all trainings in RETURN23XPLOIT
2023-02-11

Level up your #cybersecurity skills with #RETURN23XPLOIT! Our trainings offer hands-on instruction from top industry experts. In week 2, learn #Ventura #Exploitation, #SymbolicExecution, #ReverseEngineering, #Cryptography & more. Don't miss out!

ringzer0.training/

#infosec #training

An overview of all trainings in week 2 of RETURN23XPLOIT
2022-12-15

How I gave ManticoreUI a makeover - By Calvin Fong
During my internship at Trail of Bits, I explored the effectiveness... blog.trailofbits.com/2022/12/1 #symbolicexecution #manticore

2022-12-13

Manticore GUIs made easy - By Wong Kok Rui, National University of Singapore
Trail of Bits maintains Manticor... blog.trailofbits.com/2022/12/1 #symbolicexecution #binaryninja #manticore #ghidra

2022-02-23

Maat: Symbolic execution made easy - By Boyan Milanov
We have released Maat, a cross-architecture, multi-purpose, and u... blog.trailofbits.com/2022/02/2 #symbolicexecution #uncategorized

2021-11-17

MUI: Visualizing symbolic execution with Manticore and Binary Ninja - By Alan Chang, University of Oxford
During my summer internship, I had the wonderf... blog.trailofbits.com/2021/11/1 #internshipprojects #symbolicexecution #binaryninja #manticore

2020-07-12

Contract verification made easier - Smart contract authors can now express security properties in the same language they use to write ... more: blog.trailofbits.com/2020/07/1 #symbolicexecution #blockchain #manticore

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst