首页
社区
课程
招聘
[原创]Pip3line - the Swiss army knife of byte manipulation
发表于: 2014-11-18 19:39 2865

[原创]Pip3line - the Swiss army knife of byte manipulation

2014-11-18 19:39
2865
Pip3line - the Swiss army knife of byte manipulation

Here at NCC Group we work with raw bytes a lot! As I couldn't find a good tool to manipulate, encode and decode easily I set about writing Pip3line a while back. While it has been available for a while as open source I've not really discussed it outside of NCC hence this post.
What is pipeline?

What is Pip3line? It's a raw bytes manipulation utility, able to apply well known and less well known transformations from anywhere to anywhere (almost). Or put another way it is a tool for manipulating raw bytes blocks, and is able to apply diverse transformations to them.

Its main usefulness is for security research, penetration testing, reverse-engineering and binary analysis purposes.
What does it looks like? What can it do?

On a Linux system the main window would look like this:



Current transformations list include classic decoders such as Base64/32/hex to simple cryptographic ciphers, and includes common hashes algorithms as well as obfuscation techniques.

Easy to use, but still offering some tweaking for most transformations, it also has the ability to save/restore a configured transformation chain for future used.

The tool is also able to apply a transformation chain `en masse` to either a file, or data blocks received from a TCP socket, a Named Pipe (Windows) or a UNIX Socket (UNIX/Linux) via the mass processing utility

To help reverse engineering, it has a powerful quick view functionality is present, which will automatically apply a transformation to the current selection.



The text analysis functionality gives you some basic information from your input.



Simple analysis

Finally the tool allows you to import/export bytes data easily, either via the Tray Icon, the context menu, or the pre-configured shortcuts.



Import
It's extensible too!

Pip3line was designed to be extensible from the output, it allows you to create your own transformations by using the C++/QT plugin API.

Alternatively you can just use the powerful Python 2.7 & 3 plugins to load your own Python scripts.
Where to get it from?

You can get the source code from the NCC Group git hub repository here:

    https://github.com/nccgroup/pip3line

If you're after pre-built binaries for Linux or Windows it can be found here:

    https://code.google.com/p/pip3line/downloads/list

Note:Read the download instructions carefully
Wants to know more?

    Native plugin API - https://github.com/nccgroup/pip3line/wiki/Native-plugin-API
    Python plugins - https://github.com/nccgroup/pip3line/wiki/Python-plugins
    Shortcuts list - https://github.com/nccgroup/pip3line/wiki/Shortcuts-list

As always we'd love to hear your feedback and any ideas you have for features via the comments.

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回

账号登录
验证码登录

忘记密码?
没有账号?立即免费注册