Skip to content
Avatar
Block or Report

Block or report RobinDavid

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
RobinDavid/README.md

Hi there 👋. Here are some pinpoints to tools I am using or I am working/worked on.

Tools

  • Qsynthesis: Program synthesizer geared for deobfuscation. It leverages, Triton for symbolic execution, and also LevelDB, Z3 llvmlite, capstone
  • idasec: (unmaintained anymore), opaque predicate deobfuscation, trace generation via an IDA Pro plugin (using Binsec)
  • pydimacs, simple module to manipule CNF (Conjonctive Normal Form), graphs using Z3 Python API

Technical Blog Posts

Contact

<-- just here

Pinned

  1. Greybox Synthesizer geared for deobfuscation of assembly instructions.

    Python 94 13

  2. idasec Public

    IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform

    Python 110 29

  3. Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.

    C++ 2.6k 483

  4. 1
    #define  _GNU_SOURCE
    2
    #include <unistd.h>
    3
    #include <dlfcn.h>
    4
    #include <sys/mman.h>
    5
    #include <link.h>
  5. 1
    #include <iostream>
    2
    
                  
    3
    using namespace std;
    4
    
                  
    5
    int main(int argc,char* argv[])
  6. 1
    #!/usr/bin/env python3
    2
    import z3
    3
    
                  
    4
    a = z3.BitVec("a", 8)
    5
    b = z3.BitVec("b", 8)

24 contributions in the last year

Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Mon Wed Fri

Contribution activity

November 2022

Created 8 commits in 1 repository

Seeing something unexpected? Take a look at the GitHub profile guide.