de4py
LIEF
de4py | LIEF | |
---|---|---|
3 | 4 | |
769 | 4,153 | |
- | 1.6% | |
8.5 | 9.3 | |
11 days ago | 7 days ago | |
Python | C++ | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
de4py
- De4py: Toolkit for Python Reverse Engineering
-
De4py: Toolkit for python reverse engineering
De4py is a simple python reverse engineering toolkit that contains deobfuscators for some popular obfuscators and some additional functionality that can help in reverse engineering.
LIEF
-
What's the Most Portable Way to Include Binary Blobs in an Executable?
My team is working on this problem in the context of creating Node.js single-executable applications. While the naive approach of just appending data at the end of the binary works, it is not friendly with code-signature in macOS and Windows given that signing operates on PE and Mach-O sections.
We have recently open-sourced a small tool called Postject (https://github.com/postmanlabs/postject), which is able to inject arbitrary data as proper ELF/Mach-O/PE sections for all major operating systems (with AIX support coming). The tool also provides C/C++ cross-platform headers for easily traversing the final binary and introspect whether the segment is present or not.
The tool is based on the LIEF (https://github.com/lief-project/LIEF) project.
At Postman, we are making use of this on our custom Node.js single-executable applications and soon on our custom Electron.js builds too.
-
Pefile python module features
https://github.com/lief-project/LIEF https://lief-project.github.io/doc/latest/api/python/index.html
-
Collection of tools for executable packing detection
Bintropy: Entropy-based packing detection featuring multiple modes (whole binary, per section or segment). Based on the awesome LIEF library, therefore supports ELF, PE, Mach-O.
-
rabin2 for scraping ELF to JSON
I've been looking at LIEF toolkit for similar purposes (https://github.com/lief-project/LIEF). It's a python framework for cross platform binary analysis. I'm curious, does rabin2 support dll format?
What are some alternatives?
Anubis - A Python script to obfuscate and protect your code through anti debuggers, junk code and custom encryption.
dll-proxy-generator - Creates a proxy dll which sits between the game and original dll
Shtreeba - VAC-proof 32bit DLL injector written in C++, using memory mapping and thread hijacking techniques
radare2 - UNIX-like reverse engineering framework and command-line toolset
mysterium - Mysterium the first tool which permits you to retrieve the most part of a Python code even the .py or .pyc was extracted from an executable file, even it is encrypted with every existing encryptage. Mysterium don't make any difference between encrypted and non encrypted files, it can retrieve code from Pyarmor or .pyc files.
tree-sitter-html - HTML grammar for Tree-sitter
peekaboo - Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.
pe - A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
lazy_importer - library for importing functions from dlls in a hidden, reverse engineer unfriendly way
vivaldi_modding - Custom modifications for Vivaldi web browser.
bintropy - Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes
goblin - An impish, cross-platform binary parsing crate, written in Rust