dynStruct Logo

dynStruct

0
Free
Visit Website

dynStruct is a tool using dynamoRio to monitor memory accesses of an ELF binary via a data gatherer, and use this data to recover structures of the original code. dynStruct can also be used to quickly find where and by which function a member of a structure is write or read. Papers: dynStruct was the subject of a master thesis and a publication. Requirements: Data gatherer, CMake >= 2.8, DynamoRIO (avoid the last release, recommended version at DynamoRIO cronbuild or build 7.91.18109). Structure recovery and web interface: Python3, Capstone, Bottle. Setup: - Data Gatherer: Set the environment variable DYNAMORIO_HOME to the absolute path of your DynamoRIO installation. Execute build.sh. To compile dynStruct for a 32bits target on a 64bits os, execute build.sh 32. - Structure recovery and web interface: Install dependencies for dynStruct.py using 'pip3 install -r requirements.txt'. Data gatherer Usage: drrun -opt_cleancall 3 -c <dynStruct_path> <dynStruct_args> -- <prog>

FEATURES

ALTERNATIVES

PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.

A library and command line interface for extracting URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora.

A tool for identifying sensitive secrets in public GitHub repositories

A Burp plugin for identifying potential vulnerabilities in web applications

OCyara performs OCR on image files and scans them for matches to Yara rules, supporting Debian-based Linux distros.

RABCDAsm is a collection of utilities for ActionScript 3 assembly/disassembly and SWF file manipulation.

Define and validate YARA rule metadata with CCCS YARA Specification.

Standalone graphical utility for viewing Java source codes from ".class" files.