Triton
Apache-2.0🧬 Reverse Engineering · C++
Triton is a dynamic binary analysis library that provides symbolic execution, taint analysis, and abstract syntax tree (AST) representations of program semantics for building custom program analysis tools. It lifts native instructions from x86, x64, ARM32, and AArch64 into an intermediate representation, enabling precise reasoning about program behavior including constraint solving for input generation and vulnerability discovery. Reverse engineers, vulnerability researchers, and software verification engineers use Triton to automate tasks like deobfuscation, coverage-guided analysis, exploit generation, and program verification that would be impractical to perform manually. The framework exposes a comprehensive Python API alongside its C++ core, allowing researchers to script sophisticated analyses that combine concrete execution with symbolic reasoning to explore program paths and extract semantic information.
Tags
Details
- Category
- 🧬 Reverse Engineering
- Language
- C++
- Repository
- JonathanSalwan/Triton
- License
- Apache-2.0
- Platforms
- 🐧linux🍎macos
Links
Community Reviews
No reviews yet. Be the first to review Triton.
More in Reverse Engineering
dnSpy
C#.NET debugger, decompiler, and assembly editor. Inspect and modify .NET and Unity assemblies without source code.
ILSpy
C#Open-source .NET decompiler and assembly browser. Produces clean C# from compiled binaries with cross-platform support.
x64dbg
C++Open-source x64/x32 debugger for Windows. Full-featured binary debugger with plugin ecosystem for malware analysis and reverse engineering.
Detect It Easy
C++/QtBinary packer and compiler detection. Identifies compilers, linkers, packers, and protectors used to build PE, ELF, and Mach-O files.
angr
PythonBinary analysis framework. Symbolic execution, CFG recovery, and vulnerability discovery for compiled binaries in Python.
RetDec
C++Retargetable decompiler by Avast. Converts machine code back to C from x86, ARM, MIPS, and PowerPC binaries.