-
Notifications
You must be signed in to change notification settings - Fork 8
AmrThabet/pySRDF
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
======================================================================== pySRDF Project Overview ======================================================================== Overview: --------- This Project is a the python implementation for The Security Research and Development Framework This Project includes: 1. PE Parser 2. Process analyzer, DLL Injector 3. Debugger 4. x86 Emulator for binary files and shellcodes That's the strongest reverse engineering and malware analysis tool for python and the easiest to install and use The application still in the pre-stage and BETA !! ... and doesn't have all SRDF features like in C++ Usage: ------- To use it ... just ensure that you have the binary files: 1. _pySRDF.pyd 2. pySRDF.py 3. SRDF.dll 4. X86 Emulator.dll 5. sqlite3.dll the project works only on Python version 2.7 Win32 ... which works on both win32 and win64 Examples: --------- >>from pySRDF import * >>dbg = Dbg("C:\\test.exe") >>dbg.SetBp(0x401000) >>dbg.Run() OR Using the Emulator: >> emu = Emulator("C:\\test.exe") >> emu.SetBp("eip == 0x401000") >> emu.Run() OR >> emu.SetBp("__isdirty(eip)") #which set bp on Execute on modified data >> emu.Run() #used for packed files and encrypted malware Source Code: ------------ To make the project compiled successfully ... you must clone winSRDF beside it and include it in the solution Contact us on: -------------- Twitter: https://www.twitter.com/winSRDF Website: http://www.security-framework.com
About
This is the python wrapper for The Security Framework SRDF
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published