Pyda is an innovative tool designed to simplify dynamic binary analysis by allowing developers to write analysis tools in Python.
Built on top of Dynamorio-based instrumentation, Pyda integrates seamlessly with a CPython interpreter, enabling users to inject Python code into x86/ARM64 Linux processes without relying on traditional debugging methods like GDB or ptrace.
pwntools
can be installed and used directly, enhancing functionality for tasks like symbol lookup or ELF parsing.p.run_until(pc)
for interleaving execution and I/O.Here’s a simple example of using Pyda:
pythonfrom pyda import *
from pwnlib.elf.elf import ELF
p = process()
e = ELF(p.exe_path)
e.address = p.maps[p.exe_path].base
def main_hook(p):
print(f"at main, rsp={hex(p.regs.rsp)}")
return_addr = p.read(p.regs.rsp, 8)
print(f"return address: {hex(u64(return_addr))}")
p.hook(e.symbols["main"], main_hook)
p.run()
This script hooks into the main
function of a target process, retrieves the stack pointer (rsp
), and prints the return address.
Pyda currently supports only Linux systems on x86_64/ARM64 architectures. Additionally, it inherits limitations from Dynamorio, such as compatibility issues with certain programs that detect instrumentation.
Pyda is a powerful tool for dynamic binary analysis, combining Python’s flexibility with efficient instrumentation capabilities.
Whether you’re debugging complex software, reverse engineering binaries, or solving CTF challenges, Pyda offers an intuitive and robust solution for dynamic analysis tasks.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…