{"id":3423,"date":"2018-12-08T09:31:38","date_gmt":"2018-12-08T04:01:38","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=3423"},"modified":"2018-12-08T09:31:38","modified_gmt":"2018-12-08T04:01:38","slug":"triton-dynamic-binary-analysis","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/","title":{"rendered":"Triton &#8211; Dynamic Binary Analysis (DBA) Framework"},"content":{"rendered":"<p>Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine, AST representations of the x86 and the x86-64 instructions set semantics, SMT simplification passes, an SMT Solver Interface and, the last but not least, Python bindings.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3424\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg\" alt=\"\" width=\"473\" height=\"540\" \/><\/p>\n<p>Based on these components, you are able to build program analysis tools, automate reverse engineering and perform software verification. As it is still a young project, please,\u00a0<strong>don&#8217;t blame us<\/strong>\u00a0if it is not yet reliable.\u00a0<a href=\"https:\/\/github.com\/JonathanSalwan\/Triton\/issues\">Open issues<\/a>\u00a0or\u00a0<a href=\"https:\/\/github.com\/JonathanSalwan\/Triton\/pulls\">pull requests<\/a>\u00a0are always better than troll =).<\/p>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span><a href=\"https:\/\/kalilinuxtutorials.com\/miasm-reverse-engineering-framework\/\" target=\"_blank\" rel=\"noopener\">Miasm \u2013 Reverse Engineering Framework In Python<\/a><\/strong><\/p>\n<h3>Support<\/h3>\n<ul>\n<li><strong>IRC<\/strong>: #qb_triton@freenode<\/li>\n<li><strong>Mail<\/strong>: triton at quarkslab com<\/li>\n<\/ul>\n<h3>Cite Triton<\/h3>\n<pre><code>@inproceedings{SSTIC2015-Saudel-Salwan,\n  author    = {Florent Saudel and Jonathan Salwan},\n  title     = {Triton: A Dynamic Symbolic Execution Framework},\n  booktitle = {Symposium sur la s{\\'{e}}curit{\\'{e}} des technologies de l'information\n               et des communications, SSTIC, France, Rennes, June 3-5 2015},\n  publisher = {SSTIC},\n  pages     = {31--54},\n  year      = {2015},\n}<\/code><\/pre>\n<p><a href=\"https:\/\/github.com\/JonathanSalwan\/Triton\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><strong>Credit: Jonathan Salwan, Pierrick Brunet, Florent Saudel &amp; Romain Thomas<\/strong><\/p>\n<p><strong><em>You can follow us on\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/gbhackers\/\">Linkedin<\/a>,\u00a0<a href=\"https:\/\/twitter.com\/GbhackerOn\">Twitter<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/gbhackersadmin\">Facebook<\/a>\u00a0for daily Cybersecurity updates also you can take the\u00a0<a href=\"https:\/\/ethicalhackersacademy.com\/\">Best Cybersecurity courses online<\/a>\u00a0to keep your self-updated.<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine, AST representations of the x86 and the x86-64 instructions set semantics, SMT simplification passes, an SMT Solver Interface and, the last but not least, Python bindings. Based on these components, you are able [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[373,769,3408],"class_list":["post-3423","post","type-post","status-publish","format-standard","hentry","category-kali","tag-binary-analysis","tag-dba","tag-triton"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Triton - Dynamic Binary Analysis (DBA) Framework 2018<\/title>\n<meta name=\"description\" content=\"Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Triton - Dynamic Binary Analysis (DBA) Framework 2018\" \/>\n<meta property=\"og:description\" content=\"Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-08T04:01:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Triton &#8211; Dynamic Binary Analysis (DBA) Framework\",\"datePublished\":\"2018-12-08T04:01:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/\"},\"wordCount\":159,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg\",\"keywords\":[\"Binary Analysis\",\"DBA\",\"Triton\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/\",\"name\":\"Triton - Dynamic Binary Analysis (DBA) Framework 2018\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg\",\"datePublished\":\"2018-12-08T04:01:38+00:00\",\"description\":\"Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Triton - Dynamic Binary Analysis (DBA) Framework 2018","description":"Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Triton - Dynamic Binary Analysis (DBA) Framework 2018","og_description":"Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine","og_url":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-12-08T04:01:38+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Triton &#8211; Dynamic Binary Analysis (DBA) Framework","datePublished":"2018-12-08T04:01:38+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/"},"wordCount":159,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg","keywords":["Binary Analysis","DBA","Triton"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/","url":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/","name":"Triton - Dynamic Binary Analysis (DBA) Framework 2018","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg","datePublished":"2018-12-08T04:01:38+00:00","description":"Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/triton-dynamic-binary-analysis\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Triton.jpg"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":24794,"url":"https:\/\/kalilinuxtutorials.com\/maat\/","url_meta":{"origin":3423,"position":0},"title":"Maat : Open-source Symbolic Execution Framework","author":"R K","date":"May 28, 2022","format":false,"excerpt":"Maat is an open-source Dynamic Symbolic Execution and Binary Analysis framework. It provides various functionalities such as symbolic execution, taint analysis, constraint solving, binary loading, environment simulation, and leverages Ghidra's sleigh library for assembly lifting:\u00a0https:\/\/maat.re Key Features Fast & Portable: Designed to scale to real-world applications. Fully written in C++\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHuuKsX7VNZe2suL6QjpFftnd5_yfcJ-OZe0O0FYz0yUD9YuZ3SM61rHjBukPHRRwiJv54wVBnVHe8VZR8q2pTDY7Wk_smeP1p_g_aBw9cYK1SSvZtiimYarRkiODnBOUUqqkdTc343Sndb6wIXOtJCwYB85QoMhwH5e26UhReVzFtpox53Lbts3YN\/s728\/maat_logo%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHuuKsX7VNZe2suL6QjpFftnd5_yfcJ-OZe0O0FYz0yUD9YuZ3SM61rHjBukPHRRwiJv54wVBnVHe8VZR8q2pTDY7Wk_smeP1p_g_aBw9cYK1SSvZtiimYarRkiODnBOUUqqkdTc343Sndb6wIXOtJCwYB85QoMhwH5e26UhReVzFtpox53Lbts3YN\/s728\/maat_logo%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHuuKsX7VNZe2suL6QjpFftnd5_yfcJ-OZe0O0FYz0yUD9YuZ3SM61rHjBukPHRRwiJv54wVBnVHe8VZR8q2pTDY7Wk_smeP1p_g_aBw9cYK1SSvZtiimYarRkiODnBOUUqqkdTc343Sndb6wIXOtJCwYB85QoMhwH5e26UhReVzFtpox53Lbts3YN\/s728\/maat_logo%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHuuKsX7VNZe2suL6QjpFftnd5_yfcJ-OZe0O0FYz0yUD9YuZ3SM61rHjBukPHRRwiJv54wVBnVHe8VZR8q2pTDY7Wk_smeP1p_g_aBw9cYK1SSvZtiimYarRkiODnBOUUqqkdTc343Sndb6wIXOtJCwYB85QoMhwH5e26UhReVzFtpox53Lbts3YN\/s728\/maat_logo%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6895,"url":"https:\/\/kalilinuxtutorials.com\/decaf-dynamic-executable-code-analysis-framework\/","url_meta":{"origin":3423,"position":1},"title":"DECAF : Dynamic Executable Code Analysis Framework","author":"R K","date":"October 16, 2019","format":false,"excerpt":"DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF. DECAF++, the new version of DECAF, taint analysis is around 2X faster making it\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":8895,"url":"https:\/\/kalilinuxtutorials.com\/qiling\/","url_meta":{"origin":3423,"position":2},"title":"Qiling : Advanced Binary Emulation Framework","author":"R K","date":"February 9, 2020","format":false,"excerpt":"Qiling is an advanced binary emulation framework, with the following features: Cross platform: Windows, MacOS, Linux, BSDCross architecture: X86, X86_64, Arm, Arm64, MipsMultiple file formats: PE, MachO, ELFEmulate & sandbox machine code in a isolated environmentProvide high level API to setup & configure the sandboxFine-grain instrumentation: allow hooks at various\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/p17ONUbCnUU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9405,"url":"https:\/\/kalilinuxtutorials.com\/abd-advanced-binary-deobfuscation\/","url_meta":{"origin":3423,"position":3},"title":"ABD : Course Materials For Advanced Binary Deobfuscation","author":"R K","date":"February 29, 2020","format":false,"excerpt":"ABD is the course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories Advanced Binary Deobfuscation This repository contains the course materials of Advanced Binary Deobfuscation at the\u00a0Global Cybersecurity Camp (GCC) Tokyo\u00a0in 2020. Course Abstract Reverse engineering is not easy, especially if a binary code is obfuscated. Once obfuscation\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2634,"url":"https:\/\/kalilinuxtutorials.com\/mobsf-mobile-security-framework\/","url_meta":{"origin":3423,"position":4},"title":"MobSF &#8211; Mobile Security Framework Is An Automated All-In-One Mobile Application","author":"R K","date":"September 17, 2018","format":false,"excerpt":"Mobile Security Framework or MobSF is an automated, all-in-one mobile application (Android\/iOS\/Windows) pen-testing framework capable of performing static, dynamic and malware analysis. It can be used for effective and fast security analysis of Android, iOS and Windows mobile applications and support both binaries (APK, IPA & APPX ) and zipped\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/MobSF1.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":34744,"url":"https:\/\/kalilinuxtutorials.com\/amoco\/","url_meta":{"origin":3423,"position":5},"title":"Amoco &#8211; Advancing Symbolic Binary Analysis In Python","author":"Varshini","date":"September 9, 2024","format":false,"excerpt":"Amoco is a cutting-edge Python package designed for the symbolic analysis of binaries, streamlining the decoding process across various architectures. It provides a robust framework for instruction semantics and a flexible execution model to handle both concrete and symbolic values efficiently. Amoco's ongoing development promises to expand its capabilities, making\u2026","rel":"","context":"In &quot;software&quot;","block_context":{"text":"software","link":"https:\/\/kalilinuxtutorials.com\/category\/software\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzArwWf1WFGOaJGHqXhul_hZidUjswJ3bXpyM9v_scb2kvRON7ASnifaKvpU95iCJiP0BvC4ZsdSahswP6MhbA_vbvEP0IBRVkO5naTHSYgG8WPsdc5PdpQPvg0xmxZ7umd6o1RXw9fPEeWYLc_buYenk1FJrboHNqKxn6xagXrSYnR93RHEYBh-Q4RvkO\/s16000\/Amoco%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzArwWf1WFGOaJGHqXhul_hZidUjswJ3bXpyM9v_scb2kvRON7ASnifaKvpU95iCJiP0BvC4ZsdSahswP6MhbA_vbvEP0IBRVkO5naTHSYgG8WPsdc5PdpQPvg0xmxZ7umd6o1RXw9fPEeWYLc_buYenk1FJrboHNqKxn6xagXrSYnR93RHEYBh-Q4RvkO\/s16000\/Amoco%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzArwWf1WFGOaJGHqXhul_hZidUjswJ3bXpyM9v_scb2kvRON7ASnifaKvpU95iCJiP0BvC4ZsdSahswP6MhbA_vbvEP0IBRVkO5naTHSYgG8WPsdc5PdpQPvg0xmxZ7umd6o1RXw9fPEeWYLc_buYenk1FJrboHNqKxn6xagXrSYnR93RHEYBh-Q4RvkO\/s16000\/Amoco%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzArwWf1WFGOaJGHqXhul_hZidUjswJ3bXpyM9v_scb2kvRON7ASnifaKvpU95iCJiP0BvC4ZsdSahswP6MhbA_vbvEP0IBRVkO5naTHSYgG8WPsdc5PdpQPvg0xmxZ7umd6o1RXw9fPEeWYLc_buYenk1FJrboHNqKxn6xagXrSYnR93RHEYBh-Q4RvkO\/s16000\/Amoco%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzArwWf1WFGOaJGHqXhul_hZidUjswJ3bXpyM9v_scb2kvRON7ASnifaKvpU95iCJiP0BvC4ZsdSahswP6MhbA_vbvEP0IBRVkO5naTHSYgG8WPsdc5PdpQPvg0xmxZ7umd6o1RXw9fPEeWYLc_buYenk1FJrboHNqKxn6xagXrSYnR93RHEYBh-Q4RvkO\/s16000\/Amoco%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzArwWf1WFGOaJGHqXhul_hZidUjswJ3bXpyM9v_scb2kvRON7ASnifaKvpU95iCJiP0BvC4ZsdSahswP6MhbA_vbvEP0IBRVkO5naTHSYgG8WPsdc5PdpQPvg0xmxZ7umd6o1RXw9fPEeWYLc_buYenk1FJrboHNqKxn6xagXrSYnR93RHEYBh-Q4RvkO\/s16000\/Amoco%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/3423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=3423"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/3423\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=3423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=3423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=3423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}