Skip to content
View RobinDavid's full-sized avatar

Block or report RobinDavid

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
RobinDavid/README.md

Hi there! πŸ‘‹

I'm Robin - I am Software Security Researcher @ Quarkslab. You can find below some projects I am developing or contributing to.

⚑ Projects

Fuzzing / Symbolic Execution:

  • PASTIS: Collaborative fuzzing infrastructure. It leverages AFL++, Honggfuzz and TritonDSE (thus greybox and whitebox fuzzing) for program coverage and bug discovery.
  • TritonDSE: Symbolic Execution engine based on Triton built for automatic program coverage exploration. It has been design to encompass multiple program analysis use-cases.

Deobfuscation / Program Synthesis:

Diffing / Firmware Analysis: Portal

Other:

  • pydimacs, simple module to manipule CNF (Conjonctive Normal Form), graphs using Z3 Python API

πŸ“ž Contact

⬅️ just here

✍️ Technical Blog Posts

πŸ“ˆ Stats

Github stats Top Langs

More details πŸ”¬ https://www.githubwrapped.io/RobinDavid

Pinned Loading

  1. quarkslab/qsynthesis quarkslab/qsynthesis Public

    Greybox Synthesizer geared for deobfuscation of assembly instructions.

    Python 142 18

  2. idasec idasec Public

    IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform

    Python 115 25

  3. JonathanSalwan/Triton JonathanSalwan/Triton Public

    Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.

    C++ 3.6k 540

  4. PoC to checksum a given portion of t... PoC to checksum a given portion of the code
    1
    #define  _GNU_SOURCE
    2
    #include <unistd.h>
    3
    #include <dlfcn.h>
    4
    #include <sys/mman.h>
    5
    #include <link.h>
  5. Retrieve MMX and SSE support using t... Retrieve MMX and SSE support using the CPUID assembly command.
    1
    #include <iostream>
    2
    
                  
    3
    using namespace std;
    4
    
                  
    5
    int main(int argc,char* argv[])
  6. SMT formula very hard to solve, even... SMT formula very hard to solve, even though its size is rather small
    1
    #!/usr/bin/env python3
    2
    import z3
    3
    
                  
    4
    a = z3.BitVec("a", 8)
    5
    b = z3.BitVec("b", 8)