First published: February 2016 Production reference: 1250216 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78216-710-5 www.packtpub.com
2025-05-11 20:44:45 2.06MB linux
1
什么是Kam1n0 v2? Kam1n0 v2.x是可扩展的装配管理和分析平台。 它允许用户首先将(大型)二进制文件集合索引到不同的存储库中,并提供不同的分析服务,例如克隆搜索和分类。 通过使用Application的概念,它支持多租户访问和程序集存储库的管理。 应用程序实例包含其自己的专用存储库,并提供专门的分析服务。 考虑到反向工程任务的多功能性,Kam1n0 v2.x服务器当前提供三种不同类型的克隆搜索应用程序: Asm-Clone , Sym1n0和Asm2Vec以及基于Asm2Vec的可执行分类。 可以将新的应用程序类型进一步添加到平台。 用户可以创建多个应用程序实例。 可以在特定的用户组之间共享应用程序实例。 应用程序存储库的读写访问权限和开/关状态可以由应用程序所有者控制。 Kam1n0 v2.x服务器可以使用多个共享资源池同时为应用程序提供服务。 Kam1n0由和在加
1
Learning Linux Binary Analysis 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
2023-01-26 15:28:59 2.04MB Learning Linux Binary Analysis
1
二进制忍者API 该存储库包含逆向工程平台API的文档和源代码。 分行 请注意, 分支跟踪二进制忍者的dev构建上的更改,通常是所有请求请求都应提交到的地方。但是, 分支会跟踪Binary Ninja的stable版本,它是安装后运行的默认版本。在线跟踪稳定分支。 贡献 欢迎对此库进行公共贡献。该存储库中的所有API和文档均已获得MIT许可,但是,该API与开源商业应用程序。 如果您有兴趣在提交首次PR时捐款,则会收到的通知,该通知使您可以在线签署我们的《 。 问题 该存储库的问题跟踪器不仅跟踪此处包含的源代码的问题,还跟踪更广泛的Binary Ninja产品。 建筑 从7月10日开始,可以将此API的C ++部分构建到静态库(.a,.lib)中,二进制插件可以使用链接该库。 编译后的API包含可从插件中使用的名称和功能,但是直到您与libbinaryninjacore.dylib或lib
1
Learning Linux Binary Analysis linux 二进制分析 二进制分析
2021-11-01 00:29:10 2.64MB 二进制分析
1
Dynamic binary analysis and instrumentation
2021-05-08 14:00:10 1.06MB taintanalysis
1
二进制分析实战
2021-02-16 20:01:42 3.67MB 二进制 逆向分析
1
Learning Linux Binary Analysis by Ryan "elfmaster" O'Neill 2016 | ISBN: 1782167102 | English | 282 pages | True PDF | 2 MB Key Features Grasp the intricacies of the ELF binary format of UNIX and Linux Design tools for reverse engineering and binary forensic analysis Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes Book Description Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them. The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis. This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker. What you will learn Explore the internal workings of the ELF binary format Discover techniques for UNIX Virus infection and analysis Work with binary hardening and software anti-tamper methods Patch executables and process memory Bypass anti-debugging measures used in malware Perform advanced forensic analysis of binaries Design ELF-related tools in the C language Learn to operate on memory with ptrace
2019-12-21 21:26:45 2.2MB Linux
1
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly By 作者: Dennis Andriesse ISBN-10 书号: 1593279124 ISBN-13 书号: 9781593279127 出版日期: 2018-12-11 pages 页数: (449) Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way. As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out–binary analysis can help. The goal of all binary analysis is to determine (and possibly modify) the true properties of binary programs to understand what they really do, rather than what we think they should do. While reverse engineering and disassembly are critical first steps in many forms of binary analysis, there is much more to be learned. This hands-on guide teaches you how to tackle the fascinating but challenging topics of binary analysis and instrumentation and helps you become proficient in an area typically only mastered by a small group of expert hackers. It will take you from basic concepts to state-of-the-art methods as you dig into topics like code injection, disassembly, dynamic taint analysis, and binary instrumentation. Written for security engineers, hackers, and those with a basic working knowledge of C/C++ and x86-64, Practical Binary Analysis will teach you in-depth how binary programs work and help you acquire the tools and techniques needed to gain more control and insight into binary programs. Once you’ve completed an introduction to basic binary formats, you’ll learn how to analyze binaries using techniques like the GNU/Linux binary analysis toolchain, disassembly, and code injection. You’ll then go on to implement profiling tools with Pin and learn how to build your own dynamic taint analysis tools w
2019-12-21 18:57:10 15.86MB Linux
1