Avatar

Binary Breakdown

A security-focused tech blog by Alex Benlolo, binary analyst & reverse engineer

  1. Home
  2. Reverse Engineering
  3. Development
  4. About
    1. Dark Mode

Tags

Static Dynamic Linux Windows Malware SMT Embedded GDB Hardware Symbolic Execution
Featured image of post Using Koi for Symbolic Execution to Solve CrackMes and Find Vulnerabilities

Using Koi for Symbolic Execution to Solve CrackMes and Find Vulnerabilities

Koi is a C++ extension to the Triton dynamic binary analysis library that provides convenience features for symbolic execution. By hooking functions and instructions, the heap and stack can be dynamically tracked for a large range of cyber related tasks.

Feb 12, 2025
Featured image of post Simple Walkthrough of Reverse Engineering Disassembled Code

Simple Walkthrough of Reverse Engineering Disassembled Code

A beginner-friendly reverse engineering walkthrough of a CrackMe, focusing on static analysis of a simple assembly binary using Ghidra, with step-by-step key file reconstruction.

Jul 13, 2023
1 2
© 2026 Binary Breakdown
Built with Hugo
Theme Stack designed by Jimmy