Krakatau
volatility
Krakatau | volatility | |
---|---|---|
10 | 18 | |
1,931 | 6,928 | |
- | 1.0% | |
2.9 | 0.0 | |
25 days ago | 11 months ago | |
Rust | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Krakatau
-
How to Create a UTF-16 Surrogate Pair by Hand, with Python
Since Java bytecode uses MUTF-8, which encodes astral characters as surrogate pairs, I've had to implement this conversion in Python multiple times, in Krakatau and Enjarify.
-
How hard is interop with Java?
Not sure how applicable this is for your project since my compiler was written in Python, but I used Krakatau.
- Where do I get started on AoH modding?
-
learn jvm bytecode
Here is one that disassembles the bytecodes and reassembles them https://github.com/Storyyeller/Krakatau .
-
100 Languages Speedrun: Episode 77: JVM Assembly with Jasmin
There's an additional problem that unlike regular assembly or LLVM assembly where there's some fully supported standard format, Jasmin is a third party program and different JVM assemblers and disassemblers disagree on so many things. There are also some newer assemblers and disassemblers like Krakatau you could try instead. Krakatau has different syntax than Jasmin or javap.
- GitHub - Storyyeller/Krakatau: Java decompiler, assembler, and disassembler
-
Awesome CTF : Top Learning Resource Labs
Krakatau - Java decompiler and disassembler.
- Krakatau: An assembler and disassembler for [obfuscated] Java bytecode
-
Chocopy -> JVM Compiler, implemented in Python
The compiler outputs bytecode in a text format, which can be assembled into .class files using the Krakatau assembler. Figuring out how to translate features like nested functions and nonlocals to JVM was pretty interesting, and having access to Java’s standard library made the whole thing much easier than expected.
- Can you tell an assembly language when you see one?
volatility
-
What is the appropriate uncompressed kernel ELF to use with dwarf2json? [ 5.19.0-42-generic #43~22.04.1-Ubuntu ], in order to create generate a custom symbols table to conduct linux memory forensics on Ubuntu 22.04?
I need this to create generate a custom symbols table (using dwarf2json), in order to run a memory dump acquired by Ubuntu 22.04, as Ubuntu 22.04 kernel does not work anymore with volatility 2 (Issue here: volatilityfoundation/volatility#828)
-
volatility memory analysis ep.8 – linux/mac Q!
Take a look at this link and specifically note how the profiles are named, especially Ubuntu - https://github.com/volatilityfoundation/volatility/wiki/Linux-Command-Reference
-
Dump file without a extension
I think the typical tool for analyzing OS memory dumps is Volatility but I can't give you a course in how to use it, that is supposedly what your school should be doing.
- memory dump with FTK Imager
-
How to inspect a Linux machine
Analyzing memory dumps can be hard, especially at the beginning. You might want to use comprehensive Frameworks like volatility.
-
Does anyone know why volatility isnt working?
git clone https://github.com/volatilityfoundation/volatility.git whenever i want to run something I get PS C:\Users\czare_000\python-course-for-beginners\bs4\volatility> & C:/Users/czare_000/AppData/Local/Programs/Python/Python310/python.exe c:/Users/czare_000/python-course-for-beginners/bs4/volatility/volatility/debug.py Traceback (most recent call last): File "c:\Users\czare_000\python-course-for-beginners\bs4\volatility\volatility\debug.py", line 27, in import volatility.conf ModuleNotFoundError: No module named 'volatility' or i also get except Exception, e: ^^^^^^^^^^^^ SyntaxError: multiple exception types must be parenthesized
-
Analyzing raw image
Volatility is python based so you will need to install it and volatility's required dependencies. You can find the install instructions here https://github.com/volatilityfoundation/volatility
-
PChunter equivalent on Linux?
volatility - Version 2 Version 3
- How do you work on memory analysis nowadays? Discussion about the Volatility status.
-
RAM Memory Analysis volatility
The volatility wiki should have instructions you need. Just follow the steps here (https://github.com/volatilityfoundation/volatility/wiki/Linux#making-the-profile)
What are some alternatives?
chocopy-python-compiler - Ahead-of-time compiler for Chocopy, a statically typed subset of Python 3, built in Python 3.
shellbags - Cross-platform, open-source shellbag parser
CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
binwalk - Firmware Analysis Tool [Moved to: https://github.com/ReFirmLabs/binwalk]
linux - Linux kernel source tree
volatility3 - Volatility 3.0 development
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
MalConfScan - Volatility plugin for extracts configuration data of known malware
Mak_Writing_Compilers_and_Interpreters - Source for the books from Ronald Mak - Writing Compilers and Interpreters.
picoCTF - The platform used to run picoCTF 2019.
radare2 - UNIX-like reverse engineering framework and command-line toolset [Moved to: https://github.com/radareorg/radare2]
one_gadget - The best tool for finding one gadget RCE in libc.so.6