lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <FB24803D1DF2A34FA59FC157B77C97050462A61B@IDSERV04.idef.com> Date: Wed Jul 6 15:27:00 2005 From: labs-no-reply at idefense.com (iDEFENSE Labs) Subject: iDEFENSE Labs Releases Process Stalker Authored by Pedram Amini, iDEFENSE Labs is releasing Process Stalker, a software package that combines the process of run-time profiling, state mapping and tracing. Consisting of a series of tools and scripts the goal of a successful stalk is to provide the reverse engineer with an intuitive visual interface to filtered, meaningful, run-time block-level trace data. Process Stalker is open source and is available for download from: http://labs.idefense.com The Process Stalker suite is broken into three main components; an IDA Pro plug-in, a stand alone tracing tool and a series of Python scripts for instrumenting intermediary and GML graph files. The generated GML graph definitions were designed for usage with a freely available interactive graph visualization tool. Data instrumentation is accomplished through a series of Python utilities built on top of a fully documented custom API. Binaries, source code and in-depth documentation are available in the bundled archive. The IDA Function Analyzer component was used and extended in the development of Process Stalker. This component was separately updated and is also available for download from the iDEFENSE Labs web site. Michael Sutton Director, iDEFENSE Labs
Powered by blists - more mailing lists