[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AANLkTi=iZV_vQABnV=5ZttNy=C0A7s=MXTWiw3+C8oY8@mail.gmail.com>
Date: Wed, 27 Oct 2010 21:59:02 +0300
From: Henri Lindberg <henri+fulldisclosure@...nse.fi>
To: full-disclosure@...ts.grok.org.uk
Subject: Fwd: "Back with another one of those block
rockin' beats"
Good news everyone!
nSense is releasing a tool which instruments executables during
runtime in order to extract code coverage data. This is done through
runtracing using runtime instrumentation.
Why?
Analyzing code coverage of large or self modifying executables with
various input files is a non-trivial task. This may result in the
analyst having several hundred thousand blocks of code and no
reasonable way of setting soft breakpoints on all of it
simultaneously.
The tool is written in Python and is released under the Beerware license[1].
This tool release celebrates the t2'10 infosec conference, starting
08:30 @ 2010-10-28 EEST
If interested, you can find Blocks from nsense.fi / nsense.dk -> 31337 -> Tools
Kindest regards,
nSense Vulnerability Research
[1] http://en.wikipedia.org/wiki/Beerware
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists