ICSREF Logo

ICSREF

0
Free
Visit Website

ICSREF is a modular framework that automates the reverse engineering process of CODESYS binaries compiled with the CODESYS v2 compiler. It can perform core analysis of arbitrary PRG programs, including: * Delimitation of binary blobs (i.e., functions/routines) * Identification of calls to dynamic libraries * Identification of calls to static libraries (other than CODESYS libraries) by Tasos Keliris @koukouviou Cite us! If you find our work interesting and use it in your (academic or not) research, please cite our NDSS'19 paper describing ICSREF: @inproceedings{keliris2019icsref, title={{ICSREF}: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries}, author={Keliris, A. and Maniatakos, M.}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2019} }

FEATURES

ALTERNATIVES

Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.

A simple XSS scanner tool for identifying Cross-Site Scripting vulnerabilities

A framework for creating XNU based rootkits for OS X and iOS security research

A Python script for scanning data within an IDB using Yara

A Burp plugin for identifying potential vulnerabilities in web applications

A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.

Find exploits in local and online databases instantly