IAT-Tracer V2 is a plugin for Tiny-Tracer framework (by @hasherezade) for automatically detecting and resolving functions’ parameters out of the IAT or trace logs (.tag files) of PE files.
The plugin has a GUI that allows the user to choose what imported or called functions to trace and watch and then automatically fills the parameters (library, function’s name, and the number of parameters) into the “params.txt” file used by Tiny-Tracer.
Using this tool, the user can log all the dynamically called API functions and their arguments for each call.
Example: tracing and watching interesting API functions from the Vipasana ransomware binary.
Example: tracing and watching all the dynamically called functions from the SameCoin Wiper binary.
Currently, to trace and watch a program with the Tiny-Tracer framework one needs to perform several steps manually:
The plugin is intended to automate this process, enabling the user to complete steps 1-3 offline in a matter of seconds.
The plugin is intended to be used after the installation of Tiny-Tracer.
git clone https://github.com/YoavLevi/IAT-Tracer.git
cd IAT-Tracer\
pip install -r requirements.txt
python .\IAT-Tracer.py
For more information click here.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…