#1
|
|||
|
|||
Visualizing memory accesses of an executable
I read this blog post his weekend, might be of interest for some here:
Visualizing memory accesses of an executable Links Example Image tracectory is a tool to analyze and visualize x86 instruction traces (of Windows executables, currently). The tool preprocesses an instruction trace using the miasm reverse engineering framework, and enables the user then to
|
#2
|
|||
|
|||
Now, let's map the memory in a special way, and hide some information in this picture.
Would be a funny challenge for a CTF |
#3
|
|||
|
|||
Quote:
|
The Following User Says Thank You to Stingered For This Useful Post: | ||
user1 (07-12-2018) |
#4
|
|||
|
|||
@phono
yes it is. like your work...... have a question, have an advice, maybe some good idea, src how to proper hide from any dll after load / injected in target app? Last edited by user1; 07-13-2018 at 02:42. |
Tags |
memory, ollydbg, visualizing |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Dos executable | cAtA | General Discussion | 3 | 05-20-2003 08:49 |