ctf_import Logo

ctf_import

0
Free
Visit Website

A small library that allows you to run basic functions from stripped binaries cross platform. This library is designed for you to be able to quickly call functions from a stripped binary. All you need is the file name, the function offset, and the function signature. You can get these by reverse engineering the binary in IDA or Binary Ninja. void *import(char *file, size_t offset) #include "ctf_import.h" int main() { int (* fib)(int); // a.out is a binary with a fibonacci function at offset 0xf00 fib = (int (*)(int)) import("a.out", 0xf00); printf("%d %d %d %d %d\n", fib(1), fib(2), fib(3), fib(4), fib(5)); } To compile: $ gcc example.c ctf_import.c -o example $ ./example > 1 1 2 3 5 Notes: Although the code will run "cross-OS", it will not run cross architecture. Additionally, this does not handle syscalls and anything that interacts with globals.

FEATURES

ALTERNATIVES

A curated list of open-source projects containing protestware sourced from various platforms.

A collection of YARA rules for public use, built from intelligence profiles and file work.

A collaborative malware analysis framework with various features for automated analysis tasks.

A project providing open-source YARA rules for malware and malicious file detection

A tool for reading Portable Executable (PE) files with detailed information about the file structure.

A fast and simple DOM based XSS vulnerability scanner

TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.

Automated Android Malware Analysis tool

PINNED