IAT-Tracer V2 is a plugin for Tiny-Tracer framework (by @hasherezade) for automatically detecting and resolving functions’ parameters out of the IAT or trace logs (.tag files) of PE files.
The plugin has a GUI that allows the user to choose what imported or called functions to trace and watch and then automatically fills the parameters (library, function’s name, and the number of parameters) into the “params.txt” file used by Tiny-Tracer.
Using this tool, the user can log all the dynamically called API functions and their arguments for each call.
Example: tracing and watching interesting API functions from the Vipasana ransomware binary.
Example: tracing and watching all the dynamically called functions from the SameCoin Wiper binary.
Currently, to trace and watch a program with the Tiny-Tracer framework one needs to perform several steps manually:
The plugin is intended to automate this process, enabling the user to complete steps 1-3 offline in a matter of seconds.
The plugin is intended to be used after the installation of Tiny-Tracer.
git clone https://github.com/YoavLevi/IAT-Tracer.git
cd IAT-Tracer\
pip install -r requirements.txt
python .\IAT-Tracer.py
For more information click here.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…