diff options
| author | serpilliere <serpilliere@users.noreply.github.com> | 2017-02-05 16:12:58 +0100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2017-02-05 16:12:58 +0100 |
| commit | 8d9de48de5d10c81ae61aea45c56b0553ce13fe3 (patch) | |
| tree | c76c6c54e645bb5bee4e5c899709ca6915771b88 | |
| parent | c44bd532e8363fb85c94313c0ffb83ba0b0f7f77 (diff) | |
| parent | bd6b5c61bf9769d26f84dbdcb1d0fcaf462fbf8a (diff) | |
| download | miasm-8d9de48de5d10c81ae61aea45c56b0553ce13fe3.tar.gz miasm-8d9de48de5d10c81ae61aea45c56b0553ce13fe3.zip | |
Merge pull request #487 from commial/update-refs
Update external references to Miasm
| -rw-r--r-- | README.md | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/README.md b/README.md index 24268bdc..41007a1d 100644 --- a/README.md +++ b/README.md @@ -525,8 +525,31 @@ Some options can be specified: They already use Miasm ====================== + +Tools +----- + * [Sibyl](https://github.com/cea-sec/Sibyl): A function divination too * [R2M2](https://github.com/guedou/r2m2): Use miasm2 as a radare2 plugin +* [CGrex](https://github.com/mechaphish/cgrex) : Targeted patcher for CGC binaries +* [ethRE](https://github.com/jbcayrou/ethRE) Reversing tool for Ethereum EVM (with corresponding Miasm2 architecture) + +Blog posts / papers / conferences +--------------------------------- + +* [Deobfuscation: recovering an OLLVM-protected program](http://blog.quarkslab.com/deobfuscation-recovering-an-ollvm-protected-program.html) +* [Taming a Wild Nanomite-protected MIPS Binary With Symbolic Execution: No Such Crackme](https://doar-e.github.io/blog/2014/10/11/taiming-a-wild-nanomite-protected-mips-binary-with-symbolic-execution-no-such-crackme/) +* [Génération rapide de DGA avec Miasm](https://www.lexsi.com/securityhub/generation-rapide-de-dga-avec-miasm/): Quick computation of DGA (French article) +* [Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding](https://www.internetsociety.org/sites/default/files/blogs-media/enabling-client-side-crash-resistance-overcome-diversification-information-hiding.pdf): Detect undirected call potential arguments +* [Miasm: Framework de reverse engineering](https://www.sstic.org/2012/presentation/miasm_framework_de_reverse_engineering/) (French) +* [Tutorial miasm](https://www.sstic.org/2014/presentation/Tutorial_miasm/) (French video) +* [Graphes de dépendances : Petit Poucet style](https://www.sstic.org/2016/presentation/graphes_de_dpendances__petit_poucet_style/): DepGraph (French) + +Books +----- + +* [Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation](http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118787315,subjectCd-CSJ0.html): Introduction to Miasm (Chapter 5 "Obfuscation") +* [BlackHat Python - Appendix](https://github.com/oreilly-japan/black-hat-python-jp-support/tree/master/appendix-A): Japan security book's samples Misc |