[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AANLkTinTgSJos3YZ6AfECNb-ZuSX4h18m0Ua5n+ED4YP@mail.gmail.com>
Date: Wed, 27 Oct 2010 22:11:50 +0300
From: Henri Lindberg <henri+lists@...nse.fi>
To: bugtraq@...urityfocus.com
Subject: "Back with another one of those block rockin' beats"
Good news everyone!
nSense is releasing a tool which instruments executables during
runtime in order to extract code coverage data. This is done through
runtracing using runtime instrumentation.
Why?
Analyzing code coverage of large or self modifying executables with
various input files is a non-trivial task. This may result in the
analyst having several hundred thousand blocks of code and no
reasonable way of setting soft breakpoints on all of it
simultaneously.
The tool is written in Python and is released under the Beerware license[1].
This tool release celebrates the t2'10 infosec conference, starting
08:30 @ 2010-28-10 EEST
If interested, you can find Blocks from nsense.fi / nsense.dk -> 31337 -> Tools
Kindest regards,
nSense Vulnerability Research
[1] http://en.wikipedia.org/wiki/Beerware
Powered by blists - more mailing lists