-
-
[转帖]Reversing C++ Without Getting a Heart Attack – DEvirtualize VIrtual Calls With Devi
-
发表于: 2020-11-13 18:40 1743
-
[转帖]Reversing C++ Without Getting a Heart Attack – DEvirtualize VIrtual Calls With Devi
2020-11-13 18:40
1743
Reversing C++ Without Getting a Heart Attack – DEvirtualize VIrtual Calls With Devi
TLDR: This blogpost presents devi, a tool that can help you devirtualize virtual calls in C++ binaries. It uses Frida to trace the execution of a binary and uncover the call sources and destinations of virtual calls. The collected information can then be viewed in IDA Pro, Binary Ninja, or Ghidra. The plugin adds the respective control-flow edges allowing further analysis (using different plugins) or simply providing more comfort when analyzing C++ binaries.
https://insinuator.net/2020/11/reversing-c-without-getting-a-heart-attack-devirtualize-virtual-calls-with-devi/
赞赏
他的文章
- [转帖]IDM.Computer.Solutions.UltraEdit.Enterprise.v2024.1.0.36.x64.Incl.Keyfilemaker-BTCR 1762
- [转帖]IDM.Computer.Solutions.UEStudio.Enterprise.v2024.1.0.36.x64.Incl.Keyfilemaker-BTCR 1772
- [转帖]IDM.Computer.Solutions.UltraFinder.Enterprise.v2023.0.0.17.x64.Incl.Keyfilemaker-BTCR 1650
- [转帖]JEB Decompiler 5.20.0.202411121942 mod by CXV 1669
- [转帖]Tenorshare.4uKey.for.Android.v2.1.1-AMPED 933
看原图
赞赏
雪币:
留言: