Unicorn Engine

1.3K posts

Unicorn Engine

Unicorn Engine

@unicorn_engine

The Ultimate CPU Emulator. Also see our related frameworks @capstone_engine, @keystone_engine

Katılım Haziran 2015
20 Takip Edilen6.2K Takipçiler
Unicorn Engine
Unicorn Engine@unicorn_engine·
@Eason_C13 Cool, do you use Revela inside, or totally depend on GPT?
English
0
0
2
214
Eason Chen 🌊🦐
Eason Chen 🌊🦐@Eason_C13·
I'm happy to share my new project "SuiGPT Decompiler" SuiGPT Decompiler is an AI-powered move decompiler pipeline that can convert any given Sui-move module bytecode back into easy-to-read source code. Additionally, in the bottom right corner, you can chat with the SuiGPT Chatbot about the smart contract currently being decoded. If you have any development questions, please make sure to consult SuiGPT! Check it out at suigpt.tools #Sui #Move #Decompiler #Blockchain #SmartContracts #DeveloperTools #AI #ArtificialIntelligence #GenAI #LLMs
Eason Chen 🌊🦐 tweet media
English
6
9
64
13.1K
BlockVision
BlockVision@blockvisionhq·
🔍 Code Decompiler arrives on #SuiVision! Our commitment to transparency for developers and users just got stronger. It brings @SuiNetwork Code transparent by converting bytecode into readable source code. Special thanks to @b1ackd0g for the insights and step-by-step guides. 🌟 Watch the video for the full scoop!
English
3
31
118
44.7K
Unicorn Engine retweetledi
Verichains
Verichains@Verichains·
🤝 We’re thrilled to partner with @Aptos_Labs to release Revela Decompiler - the first ever open-source tool to decompile Move bytecode back to its original source code. Revela is made open-source, find it at Verichains GitHub: github.com/verichains/rev…   Revela is also available as an online tool at revela.verichains.io
Wolfgang Grieskamp@wgrieskamp

The Move decompiler developed in collaboration by @Verichains and @AptosLabs is a game changer for the security on the @Aptos network. It allows to convert any bytecode deployed on chain back to source code. Only possible with Move! aptoslabs.medium.com/move-revealed-…

English
4
17
47
12.7K
Unicorn Engine retweetledi
John Hammond
John Hammond@_JohnHammond·
FAST malware analysis with binary emulation! @asoni taught me a ton of sweet stuff going through a Qakbot sample, Cobalt Strike and more using emulation frameworks like Unicorn and Qiling... seriously super cool, huge thanks to Anuj for showcasing! youtu.be/b5-oTMcBJQ0
YouTube video
YouTube
John Hammond tweet media
English
5
58
227
33.8K
Unicorn Engine retweetledi
Thanh Nguyen
Thanh Nguyen@redragonvn·
2/ This remind me of the response from CEO of #Multichain after we reported critical #MPC #vulnerabilities. It was later found out that all MPC 'trusted nodes' were actually run under the his personal cloud account and the #bridge got #hacked eventually! twitter.com/MultichainOrg/…
Thanh Nguyen tweet media
Multichain (Previously Anyswap)@MultichainOrg

1. On May 21, 2023, Multichain CEO Zhaojun was taken away by the Chinese police from his home and has been out of contact with the global Multichain team ever since. The team contacted the MPC node operators and learned that their operational access keys to MPC node servers had been revoked. Furthermore, these MPC node servers, like all other ordinary servers, were actually running under Zhaojun's personal cloud server account. No member of the team has access to Zhaojun's personal cloud server account, so nobody can log on to these MPC servers. 2. Later, the team established contact with Zhaojun's family and learned that all of Zhaojun's computers, phones, hardware wallets, and mnemonic phrases were confiscated by the authorities. Since the inception of the project, all operational funds and investments from investors have been under Zhaojun's control. This also means that all the team's funds and access to the servers are with Zhaojun and the police. 3. Due to the lack of information about the case, the team could only maintain project operations to the best of their abilities through the remaining access on some non-MPC servers that hadn't been revoked yet. Per the lawyer's suggestions, the team has chosen to cooperate as much as possible with the demands of Zhaojun's family and adhere to the requirements of local laws and regulations, refraining from disclosing unauthorized information about the case to the public. 4. On May 30, in a responsible approach toward the community, the team released the news about Zhaojun's disappearance and informed the community about the technical issues currently faced. 5. On June 4, Zhaojun's family successfully logged into the cloud server platform using the historical information on his home computer. However, Zhaojun's family only allowed Multichain team engineers physical access to the home computer to fix technical issues with Router2 and Router5. 6. During this period, Zhaojun's family and the lawyer were in communication with the police. The team was not informed about the details of the case but was notified that Zhaojun would be released soon and was asked to continue maintaining the system and await further updates. 7. The Multichain protocol continued to operate as designed. The team made every effort with limited resources to sustain the operation of the Multichain protocol and resolve user issues as much as possible. 8. On July 7, user assets locked on the MPC addresses were transferred to unknown addresses abnormally. According to Zhaojun's sister, login information from an IP address in Kunming was found on the cloud server platform, along with a series of operations transferring funds from the MPC addresses. 9. On July 9, Zhaojun's sister transferred the remaining user assets in the router pool and subsequently notified the team and several project parties of this asset preservation action. The funds were transferred to EOA addresses controlled by Zhaojun's sister. 0x1eed63efba5f81d95bfe37d82c8e736b974f477b 0x6b6314f4f07c974600d872182dcde092c480e57b 10. On July 13, according to information provided by Zhaojun's family, the police took Zhaojun's sister into custody. Now, Zhaojun's sister is also out of contact. The status of the assets she has preserved is uncertain, so the team believes it is necessary to inform the community about all the known circumstances. 11. Due to the lack of alternative sources of information and corresponding operational funds, the team is forced to cease operations. If there are any further notifications and developments, the team will update the community accordingly. 12. The Multichain team does not have the access to Domain Account to redirect or bring down the frontend multichain.org. Please help amplify and ask users not to use the Multichain service anymore. Can @GoDaddy help to bring down multichain.org? Thanks.

English
1
2
4
1.9K
Unicorn Engine retweetledi
Unicorn Engine retweetledi
Thanh Nguyen
Thanh Nguyen@redragonvn·
4/ We've now opted to directly inform the public about the potential #risks instead. It's also important to remember that ##MPC and #ZKP are relatively new and complex protocols, making them susceptible to #vulnerabilities. Stay tuned for more MPC/ZKP #bugs releases from us!
English
0
2
6
1.7K
Unicorn Engine retweetledi
Thanh Nguyen
Thanh Nguyen@redragonvn·
1/ After #TSSHOCK #MPC mass pwned, it's now #ZKP's turn. We've reported a Critical Proof Forgery Attack, allows anyone with access to an aggregator, to steal funds from a top #zkEVM Layer-2. Unsurprisingly, vendor's reply: '..not exploitable by anyone due to centralization'!!?
Thanh Nguyen tweet media
English
4
10
43
9K
Unicorn Engine retweetledi
Verichains
Verichains@Verichains·
Just In! Our TSSHOCK paper acceptance into @BlackHatEvents, the premier cybersecurity conference! #BHUSA Join our researchers in Vegas this August, as we will share in this briefing our critical 0-day attacks on MPC vaults and wallets. Brief notice here: #tsshock-breaking-mpc-wallets-and-digital-custodians-for-billion-profit-33343" target="_blank" rel="nofollow noopener">blackhat.com/us-23/briefing…
Verichains tweet media
English
0
5
14
1.4K