-
-
[转帖]Reversing C++ Without Getting a Heart Attack – DEvirtualize VIrtual Calls With Devi
-
发表于: 2020-11-13 18:40 1773
-
[转帖]Reversing C++ Without Getting a Heart Attack – DEvirtualize VIrtual Calls With Devi
2020-11-13 18:40
1773
Reversing C++ Without Getting a Heart Attack – DEvirtualize VIrtual Calls With Devi
TLDR: This blogpost presents devi, a tool that can help you devirtualize virtual calls in C++ binaries. It uses Frida to trace the execution of a binary and uncover the call sources and destinations of virtual calls. The collected information can then be viewed in IDA Pro, Binary Ninja, or Ghidra. The plugin adds the respective control-flow edges allowing further analysis (using different plugins) or simply providing more comfort when analyzing C++ binaries.
https://insinuator.net/2020/11/reversing-c-without-getting-a-heart-attack-devirtualize-virtual-calls-with-devi/
赞赏
他的文章
看原图
赞赏
雪币:
留言: