Want to Join Us ?

you'll be able to discuss, share and send private messages.

Python Reverse engineering (x86 / elf) to pseudo-C by joelpx

Discussion in 'Reverse engineering' started by storm shadow, Mar 11, 2015.

Share This Page

  1. storm shadow

    Techbliss Owner Admin Ida Pro Expert Developer

    Reverse

    Reverse engineering for x86 binaries (elf-format). Generate a more readable code (pseudo-C) with colored syntax.
    Warning, the project is still in development, use it at your own risks.
    This tool try to disassemble one function (by default main). The address of the function, or its symbol, can be passed by argument.
    The Makefile is used only for checking tests.


    Requirements


    python3
    python-capstone (>= 3.0.1)
    python-pyelftools

    For Python binding of Capstone engine, you can install it from PyPi, like followings:
    sudo pip3 install capstone

    You need a terminal with 256 colors, otherwise use the option -nc (or --nocolor).


    Screenshots


    $ ./reverse.py tests/nestedloop1.bin

    [​IMG]
    By opening d3/index.html you will be able to see the flow graph :
    [​IMG]




    https://github.com/joelpx/reverse
     
    Rip Cord likes this.
  2. Nihilus

    Well-Known Member Developer

    Funny guy who obviously implemented some sort of MIPS support the last 14 days.
     
    Rip Cord likes this.
Top