ICSREF Logo

ICSREF

0
Free
Visit Website

ICSREF is a modular framework that automates the reverse engineering process of CODESYS binaries compiled with the CODESYS v2 compiler. It can perform core analysis of arbitrary PRG programs, including: * Delimitation of binary blobs (i.e., functions/routines) * Identification of calls to dynamic libraries * Identification of calls to static libraries (other than CODESYS libraries) by Tasos Keliris @koukouviou Cite us! If you find our work interesting and use it in your (academic or not) research, please cite our NDSS'19 paper describing ICSREF: @inproceedings{keliris2019icsref, title={{ICSREF}: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries}, author={Keliris, A. and Maniatakos, M.}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2019} }

FEATURES

ALTERNATIVES

A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.

A curated list of open-source projects containing protestware sourced from various platforms.

A Python library for automating time-based blind SQL injection attacks

KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.

A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.

Detect capabilities in executable files and identify potential behaviors.

Cybersecurity tool merging DarunGrim's analysis algorithms, currently in internal testing for official release.

Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.