Blog home Search
logologoGo to homepage
  • Technology
  • Features
  • Demos
  • Pricing
  • Resources
    • Helpdesk & FAQ
    • Documentation
    • Github
  • Company
    • About
    • Contact
  • Blog
Blog home Search
Subscribe to What's New Subscribe to What's New
Recent posts
  • Who corrupted the data! Get a fast and precise answer with the taint
  • REVEN OpenLab - Feb 18th, 2021
  • Detecting Buffer-Overflow vulnerabilities using REVEN
Categories
  • Reven (18)
  • Technical (18)
  • Tutorial (13)
  • Automation (2)
  • Conference (2)
  • All posts (50)
Tags
  • Axion (7)
  • Reven (43)
  • Reverse engineering (29)
  • Taint (9)
  • Use after free (1)
  • Flash (1)
  • Swf (1)
  • Reven axion (1)
  • Plugin (1)
  • Deobfuscation (3)
  • Ctf (1)
  • Ctf (2)
  • Bsod (1)
  • Kernel (2)
  • Race-condition (1)
  • Cve (9)
  • Adobe flash (1)
  • Demo (13)
  • Patchguard (1)
  • Exploit (3)
  • Windows kernel (3)
  • Scripts (1)
  • Windows boot (1)
  • Uefi (1)
  • Malware analysis (2)
  • Releases (6)
  • Announcement (6)
  • Automation (3)
  • Analysis api (7)
  • Workflow api (5)
  • Pe (1)
  • Parsing (1)
  • Pte (1)
  • Syscall (1)
  • Script (1)
  • Ossi (1)
  • Oob (1)
  • Read overflow (1)
  • Use after free (2)
  • Uaf (2)
  • Garbage collector (2)
  • Memory management (2)
  • Scenario recording (5)
  • Api (1)
  • Windbg (1)
  • Buffer overflow (2)
  • Performance (1)
  • Profiling (1)
  • Use case (1)
  • Vulnerability detection (2)
  • Use cases (1)
  • Cryptography (1)

1 post in archive

Interactive write-ups with REVEN and Jupyter

09 Sep 2020 by Louis - Tutorial - Reverse Engineering Analysis API REVEN

OK, so you just recorded this nice trace of the latest malware-of-the-week, great! You went around the timeline in Axion, did some symbol search, it all looks very promising. Time to dive into the depths of the analysis… What was the name of that function again? The one that’s probably...

©2019 Tetrane