Reverse Engineering With Unicorn Emulation
9,107
Published 2023-09-08
www.patreon.com/oalabs/posts?filters%5Btag%5D=Applβ¦
Lab Notes
gist.github.com/herrcore/1a5af37f91a6f9b263a527c98β¦
-----
OALABS DISCORD
discord.gg/6h5Bh5AMDU
OALABS PATREON
www.patreon.com/oalabs
Twitch
www.twitch.tv/oalabslive
OALABS GITHUB
github.com/OALabs
UNPACME - AUTOMATED MALWARE UNPACKING
www.unpac.me/#/
-----
All Comments (15)
-
my experience with unicorn was good, just take a note you need to have aligned memory address with it. unicorn was forcing 4k alignment on map. address & size parameters must be 4KB aligned with uc_mem_map
-
Youtube really wanted me to watch this video. This has been on the top of my recommended feed on the home page for 2 weeks until I finally gave in. Seems like part of a larger tutorial series.
-
Really sick content lately I absolutely love emulation stuff! Explained so well too
-
Like 255ππ» Thank you for sharing a very great video. I will always be with my lovely and wonderful friends. Good luck πΉ
-
The goat π
-
bruh I gotta get me into this Patreon
-
Hello ππ My friendsππ Thank you so very much ππππ Like friendsπππ Happy days β€β€β€ππππ
-
Huzzah!
-
π
-
I wonder if it can emulate NXP MPC microcontroller / which based PowerPC architecture/ ?
-
can you explain an example of malware that has a VM-based obfuscation and how to analysis it ?
-
May I ask if you have tried to compile unicorn from source? I tried to compile unicorn static libraries for arm64 architecture and failed.
-
Good Night ππππ Like friendsπ₯°π₯°ππ Video very good πππβ€β€β€
-
Can you stop this strange sound at the beginning of the video because it causes disturbance when I put on headphones?