ctf_import Logo

ctf_import

0
Free
Visit Website

A small library that allows you to run basic functions from stripped binaries cross platform. This library is designed for you to be able to quickly call functions from a stripped binary. All you need is the file name, the function offset, and the function signature. You can get these by reverse engineering the binary in IDA or Binary Ninja. void *import(char *file, size_t offset) #include "ctf_import.h" int main() { int (* fib)(int); // a.out is a binary with a fibonacci function at offset 0xf00 fib = (int (*)(int)) import("a.out", 0xf00); printf("%d %d %d %d %d\n", fib(1), fib(2), fib(3), fib(4), fib(5)); } To compile: $ gcc example.c ctf_import.c -o example $ ./example > 1 1 2 3 5 Notes: Although the code will run "cross-OS", it will not run cross architecture. Additionally, this does not handle syscalls and anything that interacts with globals.

FEATURES

ALTERNATIVES

A standalone binary inspection tool for Android developers with support for various formats and dependencies.

Debugger and .NET assembly editor with advanced debugging features.

A Burp extension to check JWT tokens for potential weaknesses

UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.

A tool to find XSS vulnerabilities in web applications

A Scriptable Android Debugger for reverse engineers and developers.

A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

Repository of scripts, signatures, and IOCs related to various malware analysis topics.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved