https://github.com/JonathanSalwan/Triton
does /g/ do any low level analysis/bug hunting for exploit writing? any reversers out there? lets get a reversing thread going.
slightly shameful self bumpppppppp
>>57115768
Hint: don't bother discussing anything interesting in /g/
https://reddit.com/r/ReverseEngineering/
>>57115831
yea, well ive seen a few good thread on /g/ before about things related to software security, just gotta hope to get some people in here
Retired reverser here.
Didn't actually do a lot of exploit discovery or development. Most of those are initially found via fuzzing these days. There were some adversarial (black box) audits however those were rare.
My clients were far more frequently not the creators of what I was working on: if source were available, they probably wouldn't have been contracting a reverse-engineer at my rates!
Of course that may be the direction the field is taking more recently. Many software reversers in the security arena had a focus on malware and worked for antivirus labs, or for firms in similar arenas.
I worked with some great people in the hardware side.
>>57116021
Interesting stuff. To my understanding most of vulnerability research these days is all about satisfiability. Any insights into the world of satisfiability? or even fuzzing for that matter?