about summary refs log tree commit diff stats
diff options
context:
space:
mode:
authorserpilliere <serpilliere@users.noreply.github.com>2017-02-05 16:12:58 +0100
committerGitHub <noreply@github.com>2017-02-05 16:12:58 +0100
commit8d9de48de5d10c81ae61aea45c56b0553ce13fe3 (patch)
treec76c6c54e645bb5bee4e5c899709ca6915771b88
parentc44bd532e8363fb85c94313c0ffb83ba0b0f7f77 (diff)
parentbd6b5c61bf9769d26f84dbdcb1d0fcaf462fbf8a (diff)
downloadmiasm-8d9de48de5d10c81ae61aea45c56b0553ce13fe3.tar.gz
miasm-8d9de48de5d10c81ae61aea45c56b0553ce13fe3.zip
Merge pull request #487 from commial/update-refs
Update external references to Miasm
-rw-r--r--README.md23
1 files changed, 23 insertions, 0 deletions
diff --git a/README.md b/README.md
index 24268bdc..41007a1d 100644
--- a/README.md
+++ b/README.md
@@ -525,8 +525,31 @@ Some options can be specified:
 
 They already use Miasm
 ======================
+
+Tools
+-----
+
 * [Sibyl](https://github.com/cea-sec/Sibyl): A function divination too
 * [R2M2](https://github.com/guedou/r2m2): Use miasm2 as a radare2 plugin
+* [CGrex](https://github.com/mechaphish/cgrex) : Targeted patcher for CGC binaries
+* [ethRE](https://github.com/jbcayrou/ethRE) Reversing tool for Ethereum EVM (with corresponding Miasm2 architecture)
+
+Blog posts / papers / conferences
+---------------------------------
+
+* [Deobfuscation: recovering an OLLVM-protected program](http://blog.quarkslab.com/deobfuscation-recovering-an-ollvm-protected-program.html)
+* [Taming a Wild Nanomite-protected MIPS Binary With Symbolic Execution: No Such Crackme](https://doar-e.github.io/blog/2014/10/11/taiming-a-wild-nanomite-protected-mips-binary-with-symbolic-execution-no-such-crackme/)
+* [Génération rapide de DGA avec Miasm](https://www.lexsi.com/securityhub/generation-rapide-de-dga-avec-miasm/): Quick computation of DGA (French article)
+* [Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding](https://www.internetsociety.org/sites/default/files/blogs-media/enabling-client-side-crash-resistance-overcome-diversification-information-hiding.pdf): Detect undirected call potential arguments
+* [Miasm: Framework de reverse engineering](https://www.sstic.org/2012/presentation/miasm_framework_de_reverse_engineering/) (French)
+* [Tutorial miasm](https://www.sstic.org/2014/presentation/Tutorial_miasm/) (French video)
+* [Graphes de dépendances : Petit Poucet style](https://www.sstic.org/2016/presentation/graphes_de_dpendances__petit_poucet_style/): DepGraph (French)
+
+Books
+-----
+
+* [Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation](http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118787315,subjectCd-CSJ0.html): Introduction to Miasm (Chapter 5 "Obfuscation")
+* [BlackHat Python - Appendix](https://github.com/oreilly-japan/black-hat-python-jp-support/tree/master/appendix-A): Japan security book's samples
 
 
 Misc