dynStruct Logo

dynStruct

0
Free
Visit Website

dynStruct is a tool using dynamoRio to monitor memory accesses of an ELF binary via a data gatherer, and use this data to recover structures of the original code. dynStruct can also be used to quickly find where and by which function a member of a structure is write or read. Papers: dynStruct was the subject of a master thesis and a publication. Requirements: Data gatherer, CMake >= 2.8, DynamoRIO (avoid the last release, recommended version at DynamoRIO cronbuild or build 7.91.18109). Structure recovery and web interface: Python3, Capstone, Bottle. Setup: - Data Gatherer: Set the environment variable DYNAMORIO_HOME to the absolute path of your DynamoRIO installation. Execute build.sh. To compile dynStruct for a 32bits target on a 64bits os, execute build.sh 32. - Structure recovery and web interface: Install dependencies for dynStruct.py using 'pip3 install -r requirements.txt'. Data gatherer Usage: drrun -opt_cleancall 3 -c <dynStruct_path> <dynStruct_args> -- <prog>

FEATURES

ALTERNATIVES

A tool that generates Yara rules from training data using logistic regression and random forest classifiers.

Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.

A disassembly framework with support for multiple hardware architectures and clean API.

A native Python cross-version decompiler and fragment decompiler.

Andromeda makes reverse engineering of Android applications faster and easier.

A fast and simple DOM based XSS vulnerability scanner

KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.

A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved