Deepening the Science of Security

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products.
We combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Request a Quote


We don’t just fix bugs, we fix software. When our research into the depths of code and devices exposes gaps in the market, we engineer foundational tools to close them.

Research & Development

Binary Ninja

Binary Ninja offers security researchers a real -and easy- choice of reversing platforms. Its accessible interface and powerful automated analyses are a force multiplier for a researcher’s human intuition. We want to accelerate adoption of Binary Ninja, so we’re developing learning materials to help prospective users jump in now.

Sienna Locomotive

Sienna Locomotive brings fuzzing and crash triage to developers who lack detailed knowledge of vulnerabilities, how fuzzers work, and how to configure them. It works on Windows, was built on open-source software, and incorporates new research in crash triage to make fuzzing easy and effective.

Leveraging the Analog Domain for Security (LADS)

As a performer in DARPA's Leveraging the Analog Domain for Security program, we're writing program analysis tools to help protect low-resource systems from advanced cyber threats, such as RowHammer, which allow individual bits to get flipped in arbitrary program memory. The automated program analyzer we're engineering is built on Manticore, our Python symbolic execution platform.


Manticore unlocks the power of symbolic execution for security researchers. It's pure Python with minimal dependencies that can operate on x86, x64, and ARM binaries and Ethereum smart contracts. Anyone with experience in exploitation or reversing can use the API to create specialized binary analysis or software security tools.

CTF Field Guide

Capture the flag (CTF) competitions provide an ideal platform for students to learn to think like attackers. And yet most schools and colleges lack the expertise to form and train CTF teams for competition. This guide closes the gap, and addresses the larger skills gap in the cybersecurity industry.

More Research

Organizations We Support