lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <FB24803D1DF2A34FA59FC157B77C97050462A61B@IDSERV04.idef.com>
Date: Wed Jul  6 15:27:00 2005
From: labs-no-reply at idefense.com (iDEFENSE Labs)
Subject: iDEFENSE Labs Releases Process Stalker

Authored by Pedram Amini, iDEFENSE Labs is releasing Process Stalker, a
software package that combines the process of run-time profiling, state
mapping and tracing. Consisting of a series of tools and scripts the
goal of a successful stalk is to provide the reverse engineer with an
intuitive visual interface to filtered, meaningful, run-time block-level
trace data. Process Stalker is open source and is available for download
from:

    http://labs.idefense.com

The Process Stalker suite is broken into three main components; an IDA
Pro plug-in, a stand alone tracing tool and a series of Python scripts
for instrumenting intermediary and GML graph files. The generated GML
graph definitions were designed for usage with a freely available
interactive graph visualization tool. Data instrumentation is
accomplished through a series of Python utilities built on top of a
fully documented custom API. Binaries, source code and in-depth
documentation are available in the bundled archive.

The IDA Function Analyzer component was used and extended in the
development of Process Stalker. This component was separately updated
and is also available for download from the iDEFENSE Labs web site.

Michael Sutton
Director, iDEFENSE Labs

Powered by blists - more mailing lists