Open
Description
Official Youtube
- Official Youtube Channel: https://www.youtube.com/@qilingframework
Showcase
- Emotet's embedded C2
- dragonfly
- pwnservice
- Karton Unpacker
- Qualcomm Sahara / Firehose Attack Client / Diag Tools
- FileInsight-plugins
- efi_fuzz
- vacation3
Tutorial
- Qiling Lab 01
- Arm64 binary emulation using Qiling Framework
Papers
- On the Effectiveness of Binary Emulation in Malware Classification
- LoRaWAN’s Protocol Stacks: The Forgotten Targets at Risk
- FIRMGUIDE: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided
Kernel Execution
- EDGE OF THE ART IN VULNERABILITY RESEARCH VERSION 4 OF 4
- Dragonfly: next generation sandbox
Writeup
- [Fuzzing] Qiling 框架在 Ubuntu22.04 rootfs下遇到 CPU ISA level 错误的临时解决方案
- Unionware Writeup Part A [UnionCTF 2021]
- Dynamic analysis of firmware components in IoT devices
- [原创]一种新的Android Runtime环境仿真及调试方法
- A Sneak Peek into Smart Contracts Reversing and Emulation
- QILING: un framework para emular binarios muy útil para el análisis de malware
- Reversing embedded device bootloader (U-Boot)
- PancakeCon CTF "Crack" Challenge
- TP-Link XDR-5430-V2 研究分享 - 第一章
- Leveraging Qiling for Kport strings decryption
- Decrypt configuration files like exactly how Huawei ONT does
- Hunting IcedID and unpacking automation with Qiling
- [Mal Series # 17] Binary Emulation with Qiling Framework
- Automatic unpacking with Qiling framework
- WINTERN 2020: IOT FIRMWARE ANALYSIS
- Unpacking In-Memory Malware with Qiling
- Qiling: A true instrumentable binary emulation framework
- Playing with PE Files, Packers and Qiling Framework
- Unpacking RAGNARLOCKER via emulation
- Reproducing n-day vulnerabilities and writing N-day based fuzzer with Qiling
- Emulated a Netgear router binary using qiling to reverse a backdoor
- Using Qiling Framework to Unpack TA505 packed samples
- [PT007] Simulating and hunting firmware vulnerabilities with Qiling
- Decrypt Aisuru Bot Encoded Strings with Qiling Framework
- Brute-Force Flareon2015 Challenge#2 with Qiling
- Moving From Manual Reverse Engineering of UEFI Modules To Dynamic Emulation of UEFI Firmware
- Qiling & Binary Emulation for automatic unpacking
- [原创]使用Qiling IDA插件解密Mirai病毒数据
- Part II: Analyzing a buffer overflow in the DLINK DIR-645 with Qiling framework, Part II
- Part I: Analyzing a buffer overflow in the DLINK DIR-645 with Qiling framework and Ghidra.
- Automated dynamic import resolving using binary emulation
- Using Qiling to resolve obfuscated import on windows
- Dive deeper – Analyze real mode binaries like a Pro with Qiling Framework
- How to reproduce CVE-2020-8962 with Qiling Framework
- Qiling For Malware Analysis: Part 1 and Part 2
- PE Emulation With Code Coverage Using Qiling and Dragon Dance
- Automated malware unpacking with binary emulation
- ByteBandits CTF 2020 - Autobot
- Qiling Scripting and Simple RE Task
- Certego research at the HITB Security Conference:
- EFI_DXE_Emulator: Qiling support in the works!
- 多架构二进制 Fuzzing 的几种环境搭建
- Phân tích mẫu mã độc khai thác lỗ hổng Microsoft Office Equation Editor
- Qiling Fuzzer
- Csaw CtF
Media
- https://isc.sans.edu/podcastdetail.html?id=7482
- https://www.kitploit.com/2020/02/qiling-advanced-binary-emulation.html
- https://hakin9.org/qiling-advanced-binary-emulation-framework/
- https://infoseccampus.com/sectools-e19-kaijern/
Conference
- https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553
- https://blackhatmea.com/node/724
- https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119
- https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/
- https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643
- https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781
- https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/
- https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062
- https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245
- https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php
- https://conference.hitb.org/lockdown-livestream/
- https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing
- https://hitcon.org/2019/CMT/agenda
- https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/
Podcast
- Episode 1: https://www.youtube.com/watch?v=lCSVNr5p9LI
- Episode 2: https://www.youtube.com/watch?v=074zX1LeR5I
- Episode 3: https://www.youtube.com/watch?v=BOFG5GzdM4k
- Episode 4: https://www.youtube.com/watch?v=14NQJkvR_gU
Youtube
- Official Youtube Channel: https://www.youtube.com/@qilingframework
- Talk In HITB Cyberweek, Nov 2020: https://www.youtube.com/watch?v=ykUXUZo8fAk
- Talk In HITBLockdown 002, July 2020: https://www.youtube.com/watch?v=e3_T3KLh2NU
- Talk In HITBLockdown 001, April 2020: https://www.youtube.com/watch?v=2fHCrWduGuw
- Talk In Nullcon, March 2020: https://www.youtube.com/watch?v=K_eyXesGJbQ
- Talk in zeronights, Nov 2019: https://www.youtube.com/watch?v=xf0i9kfHKDI
Metadata
Metadata
Assignees
Labels
No labels
Activity