A Radare2 based Python module for Binary Analysis and Reverse Engineering.
- You can simply run this command.
pip3 install zepu1chr3
- Description: You can specify any binary file to analysis you want. It returns a handler for target file.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
- Description: This method will give you what symbols are inside of the target file. It returns an array of symbol information.
import zepu1chr3
zep = zepu1chr3.Binary()
target zep.File("WannaCry.exe")
symbols = zep.GetSymbols(target)
- Description: This method will give you what imports are inside of the target file. It returns an array of import information.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
imports = zep.GetImports(target)
- Description: This method will give you what functions are inside of the target file. It returns an array of function information.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
functions = zep.GetFunctions(target)
- Description: This method will give you what sections are inside of the target file. It returns an array of section information.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
sections = zep.GetSections(target)
- Description: This method will give you disassembled function codes if
only_codes
parameter set toTrue
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
disas = zep.DisassembleFunction(target, given_function="entry0", only_codes=True)
second = zep.DisassembleFunction(target, given_function="0x401000", only_codes=True) # You can use offsets to!!
- Description: If you set
only_codes
parameter asFalse
you will get more verbose output.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
disas = zep.DisassembleFunction(target, given_function="entry0", only_codes=False)