ICSREF Logo

ICSREF

0
Free
Visit Website

ICSREF is a modular framework that automates the reverse engineering process of CODESYS binaries compiled with the CODESYS v2 compiler. It can perform core analysis of arbitrary PRG programs, including: * Delimitation of binary blobs (i.e., functions/routines) * Identification of calls to dynamic libraries * Identification of calls to static libraries (other than CODESYS libraries) by Tasos Keliris @koukouviou Cite us! If you find our work interesting and use it in your (academic or not) research, please cite our NDSS'19 paper describing ICSREF: @inproceedings{keliris2019icsref, title={{ICSREF}: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries}, author={Keliris, A. and Maniatakos, M.}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2019} }

FEATURES

ALTERNATIVES

Interactive malware hunting service with live access to the heart of an incident.

UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.

Generates a YARA rule to match basic blocks of the current function in IDA Pro

A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.

Search gadgets on binaries to facilitate ROP exploitation.

A minimal, consistent API for building integrations with malware sandboxes

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

A powerful tool for detecting and identifying malware using a rule-based system.

PINNED