full screen background image

manticore v0.1.3: Dynamic binary analysis tool

Manticore is a prototyping tool for dynamic binary analysis, with support for symbolic execution, taint analysis, and binary instrumentation.


  • Input Generation: Manticore automatically generates inputs that trigger unique code paths
  • Crash Discovery: Manticore discovers inputs that crash programs via memory safety violations
  • Execution Tracing: Manticore records an instruction-level trace of execution for each generated input
  • Programmatic Interface: Manticore exposes programmatic access to its analysis engine via a Python API

Manticore supports binaries of the following formats, operating systems, and architectures. It has been primarily used on binaries compiled from C and C++. Examples of practical manticore usage are also on github.

  • OS/Formats: Linux ELF, Windows Minidump
  • Architectures: x86, x86_64, ARMv7 (partial)

Change log v0.1.3


  • Support for Redis as a storage backend, plus an API for user-defined serializers and storage backends
  • “Events” which work as global signals for communication across manticore
  • Support for using Binary Ninja for visualization
  • Executor now provides a global shared context
  • State now provides a local context


  • Refactored Executor and everything it talks to significantly
  • Some older APIs may be broken or removed by the above refactor (state.co is no more, for instance)


  • Numerous bugfixes and stability improvements in logging, Windows, x86, Linux


# Install system dependencies
sudo apt-get update && sudo apt-get install z3 python-pip -y
python -m pip install -U pip
# Install manticore and its dependencies
git clone https://github.com/trailofbits/manticore.git && cd manticore
sudo pip install .
# Build the examples
cd examples/linux
# Use the Manticore CLI
manticore basic
cat mcore_*/*1.stdin | ./basic
cat mcore_*/*2.stdin | ./basic
# Use the Manticore API
cd ../script
python count_instructions.py ../linux/helloworld



$ manticore ./path/to/binary  # runs, and creates a mcore_* directory with analysis results


Source: Github



Πηγή : securityonline

Anastasis Vasileiadis

PC Technical || Penetration Tester || Ethical Hacker || Cyber Security Expert || Cyber Security Analyst || Information Security Researcher || Part-Time Hacker || Child Pornography & Sexual Abuse Combat

Leave a Reply

Your email address will not be published. Required fields are marked *