dynStruct Logo

dynStruct

0
Free
Visit Website

dynStruct is a tool using dynamoRio to monitor memory accesses of an ELF binary via a data gatherer, and use this data to recover structures of the original code. dynStruct can also be used to quickly find where and by which function a member of a structure is write or read. Papers: dynStruct was the subject of a master thesis and a publication. Requirements: Data gatherer, CMake >= 2.8, DynamoRIO (avoid the last release, recommended version at DynamoRIO cronbuild or build 7.91.18109). Structure recovery and web interface: Python3, Capstone, Bottle. Setup: - Data Gatherer: Set the environment variable DYNAMORIO_HOME to the absolute path of your DynamoRIO installation. Execute build.sh. To compile dynStruct for a 32bits target on a 64bits os, execute build.sh 32. - Structure recovery and web interface: Install dependencies for dynStruct.py using 'pip3 install -r requirements.txt'. Data gatherer Usage: drrun -opt_cleancall 3 -c <dynStruct_path> <dynStruct_args> -- <prog>

FEATURES

ALTERNATIVES

Repository of scripts, signatures, and IOCs related to various malware analysis topics.

Interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features

Identifies 137 malicious npm packages and gathers system information to a remote server.

A tool that generates Yara rules from training data using logistic regression and random forest classifiers.

A curated list of open-source projects containing protestware sourced from various platforms.

A Unix-based tool that scans for rootkits and other malware on a system, providing a detailed report of the scan results.

A javascript malware analysis tool with backend code execution.

A semi-automatic tool to generate YARA rules from virus samples.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved