Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.
llvm
reverse-engineering
symbolic-execution
deobfuscation
triton
taint-analysis
tigress
tigress-protections
solution-tigress-challenge
-
Updated
Nov 21, 2023 - LLVM