{"id":79,"date":"2020-02-27T21:10:45","date_gmt":"2020-02-27T21:10:45","guid":{"rendered":"https:\/\/reversea.me\/?page_id=79"},"modified":"2022-01-25T21:52:37","modified_gmt":"2022-01-25T21:52:37","slug":"tools","status":"publish","type":"page","link":"https:\/\/reversea.me\/index.php\/research\/tools\/","title":{"rendered":"Tools"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> &lt; 1<\/span> <span class=\"rt-label rt-postfix\">minute<\/span><\/span>\n<p style=\"font-size:14px\"><strong>All software tools are released under GNU\/GPL licenses. Closed-source versions for commercial purposes are available, please contact the authors: reverseame (at) unizar (dot) es.<\/strong><\/p>\n\n\n\n<table>\n<tr>\n<td width=\"20%\"><strong>chiton<\/strong><\/td>\n<td><i>Python library to exfiltrate data encapsulating the data into IoT protocol&#8217;s packets.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/chiton\">Source code<\/a> (GNU\/AGPL v3 license).<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>IM Artifact Finder<\/strong><\/td>\n<td><i>Instant Messaging Artifact Finder<\/i> (IM Artifact Finder) <i>is a framework tool to find memory artifacts present in instant messaging (IM) applications.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/instant-messaging-artifact-finder\">Source code<\/a> (GNU\/GPL v3 license).<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>Windows Memory Extractor<\/strong><\/td>\n<td><i>C++ tool to extract contents from the memory of Windows processes (it dumps the allocated memory).<\/i><br><a href=\"https:\/\/github.com\/reverseame\/windows-memory-extractor\">Source code<\/a> (GNU\/GPL v3 license).<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>rop3<\/strong><\/td>\n<td><i>Python tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/rop3\">Source code<\/a> (GNU\/GPL v3 license).<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>dumd-mixer<\/strong><\/td>\n<td><i>Dump Module Mixer<\/i> (dumd-mixer) <i>is a Python script to generate a module from the same module extracted from a collection of memory dumps.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/dumd-mixer\">Source code<\/a> (GNU\/GPL v3 license).<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>pagedmem<\/strong><\/td>\n<td><i>Volatility plugin to obtain the number of the memory pages paged per module (exe or dll) and per driver from a Windows memory dump.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/pagedmem\">Source code<\/a> (GNU\/GPL v3 license).<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>sigcheck &#038; sigvalidator<\/strong><\/td>\n<td>sigcheck<i> is a Volatility plugin to validate Authenticode-signed processes, either with embedded signature or catalog-signed.<\/i> sigvalidator <i>is a Python module to verify signatures of PE files.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/sigcheck\">Source code<\/a> (GNU\/GPL v3 license).<br>More information <a href=\"https:\/\/webdiis.unizar.es\/~ricardo\/files\/papers\/UR-DIIN-20.pdf\">in the paper<\/a>.<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>malscan<\/strong><\/td>\n<td><i>Volatility plugin to detect malicious code thanks to ClamAV.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/malscan\">Source code<\/a> (GNU\/AGPL v3 license).<br>More information in this post.<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>winesap<\/strong><\/td>\n<td><i>Volatility plugin to analyze the registry-based Windows ASEPs in a memory dump.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/winesap\">Source code<\/a> (GNU\/AGPL v3 license).<br>More information <a href=\"https:\/\/webdiis.unizar.es\/~ricardo\/files\/papers\/UR-DIIN-19.pdf\">in the paper<\/a>.<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>processfuzzyhash<\/strong><\/td>\n<td><i>Volatility plugin to calculate and compare Windows processes fuzzy hashes.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/processfuzzyhash\">Source code<\/a> (GNU\/AGPL v3 license).<br>More information <a href=\"http:\/\/webdiis.unizar.es\/~ricardo\/files\/papers\/RMA-ISDFS-18.pdf\">in the paper<\/a>.<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\"><strong>pinVMShield<\/strong><\/td>\n<td><i>Pin-based tool to protect a sandbox application of common anti-virtual machine and anti-sandbox detection techniques.<\/i><br><a href=\"https:\/\/github.com\/reverseame\/pinVMShield\">Source code<\/a> (GNU\/GPL v3 license).<br>More information <a href=\"https:\/\/webdiis.unizar.es\/~ricardo\/files\/papers\/RRA-LATAM-16.pdf\">in the paper<\/a>.<\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> &lt; 1<\/span> <span class=\"rt-label rt-postfix\">minute<\/span><\/span>All software tools are released under GNU\/GPL licenses. Closed-source versions for commercial purposes are available, please contact the authors: reverseame (at) unizar (dot) es. chiton Python library to exfiltrate data encapsulating the data into IoT protocol&#8217;s packets.Source code (GNU\/AGPL v3 license). IM Artifact Finder Instant Messaging Artifact Finder (IM Artifact Finder) is a framework tool [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":46,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-79","page","type-page","status-publish","hentry","no-featured-image"],"_links":{"self":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/pages\/79","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/comments?post=79"}],"version-history":[{"count":19,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/pages\/79\/revisions"}],"predecessor-version":[{"id":498,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/pages\/79\/revisions\/498"}],"up":[{"embeddable":true,"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/pages\/46"}],"wp:attachment":[{"href":"https:\/\/reversea.me\/index.php\/wp-json\/wp\/v2\/media?parent=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}