Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.
llvm reverse-engineering symbolic-execution deobfuscation triton taint-analysis tigress tigress-protections solution-tigress-challenge
-
Updated
Nov 21, 2023 - LLVM