BinCAT is a static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA or using Python for automation.
It features:
Also Read : LOLBAS – Living Off The Land Binaries And Scripts
Quick FAQ
Supported host platforms:
Supported CPU for analysis (for now):
Only IDA v7 or later is supported
v6.9 may work, but we won’t support it.
Binary distribution install (recommended)
The binary distribution includes everything needed:
Install steps:
install_plugin.py
The analyzer can be used locally or through a Web service.
On Linux:
On Windows:
BinCAT should work with IDA on Wine, once pip is installed:
~/.wine/drive_c/Python27/python.exe get-pip.py
Ctrl-Shift-B
shortcut, or using the Edit -> Plugins -> BinCAT
menuBinCAT Configuration
pane, click <-- Current
to define the start addressGlobal options can be configured through the Edit/BinCAT/Options
menu.
Default config and options are stored in $IDAUSR/idabincat/conf
.
save to idb
checkboxCybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…