logologoGo to homepage
  • Technology
  • Features
  • Demos
  • Resources
    • Helpdesk & FAQ
    • Documentation
    • Github
  • Company
    • About
    • Contact
  • Blog
Blog home
Subscribe to What's New Subscribe to What's New
Recent posts
  • REVEN 2.3: 32-bit symbols, Current Process Information, and more
  • Who's calling? Finding out which process made a system call
  • CVE-2019-1347: When a mouse over a file is enough to crash your system
Categories
  • Reven (8)
  • Technical (15)
  • Tutorial (1)
  • All posts (23)
Tags
  • Axion (7)
  • Reven (20)
  • Reverse engineering (16)
  • Taint (4)
  • Use after free (1)
  • Flash (1)
  • Swf (1)
  • Reven axion (1)
  • Plugin (1)
  • Deobfuscation (3)
  • Ctf (3)
  • Bsod (1)
  • Kernel (2)
  • Race-condition (1)
  • Cve (4)
  • Adobe flash (1)
  • Demo (4)
  • Patchguard (1)
  • Exploit (1)
  • Windows kernel (3)
  • Scripts (1)
  • Windows boot (1)
  • Uefi (1)
  • Malware analysis (1)
  • Releases (2)
  • Announcement (2)
  • Automation (2)
  • Analysis api (1)
  • Workflow api (1)
  • Pe (1)
  • Parsing (1)
  • Taint (1)
  • Pte (1)
  • Syscall (1)
  • Script (1)
  • Ossi (1)

1 post in tag Script

Who's calling? Finding out which process made a system call

21 Nov 2019 by Louis - Tutorial Technical - Automation Syscall Reverse Engineering Script

The version 2.2 of REVEN saw the addition of the Analysis Python API, that lets you automate the analysis of a scenario using scripts. The API sparkled the interest of our users and gave them inspiration to handle many use cases by scripting. One of these use cases is going...

©2019 Tetrane