A Radare2 based Python module for Binary Analysis and Reverse Engineering.
Project description
Zepu1chr3
A Radare2 based Python module for Binary Analysis and Reverse Engineering.
How to Use
Specifying a target binary
- Description: You can specify any binary file to analysis you want. It returns a handler for target file.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
Getting symbols from target binary
- Description: This method will give you what symbols are inside of the target file. It returns an array of symbol information.
import zepu1chr3
zep = zepu1chr3.Binary()
target zep.File("WannaCry.exe")
symbols = zep.GetSymbols(target)
Getting imports from target binary
- Description: This method will give you what imports are inside of the target file. It returns an array of import information.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
imports = zep.GetImports(target)
Getting functions from target binary
- Description: This method will give you what functions are inside of the target file. It returns an array of function information.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
functions = zep.GetFunctions(target)
Getting sections from target binary
- Description: This method will give you what sections are inside of the target file. It returns an array of section information.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
sections = zep.GetSections(target)
Disassembling functions or somethings contained in offsets
Getting informations about only machine code
- Description: This method will give you disassembled function codes if
only_codes
parameter set toTrue
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
disas = zep.DisassembleFunction(target, given_function="entry0", only_codes=True)
second = zep.DisassembleFunction(target, given_function="0x401000", only_codes=True) # You can use offsets to!!
Getting every information about machine code (verbose!!)
- Description: If you set
only_codes
parameter asFalse
you will get more verbose output.
import zepu1chr3
zep = zepu1chr3.Binary()
target = zep.File("WannaCry.exe")
disas = zep.DisassembleFunction(target, given_function="entry0", only_codes=False)
Pypi and Other functionalities are coming soon!!
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
zepu1chr3-0.0.2.tar.gz
(7.4 kB
view details)
Built Distribution
File details
Details for the file zepu1chr3-0.0.2.tar.gz
.
File metadata
- Download URL: zepu1chr3-0.0.2.tar.gz
- Upload date:
- Size: 7.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.3.0 pkginfo/1.4.2 requests/2.25.1 setuptools/52.0.0 requests-toolbelt/0.9.1 tqdm/4.57.0 CPython/3.9.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e33038324a9c849ead5914e2cbecd16475bee0d79a46fa5c289a60e2dc902453 |
|
MD5 | 233eb8a9a926ac14ab57510468bfdc8a |
|
BLAKE2b-256 | e7e0ff87d21918b3222edc87c9f96d695408f962c15bccc656dd7dbfa1f66c66 |
File details
Details for the file zepu1chr3-0.0.2-py3-none-any.whl
.
File metadata
- Download URL: zepu1chr3-0.0.2-py3-none-any.whl
- Upload date:
- Size: 7.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.3.0 pkginfo/1.4.2 requests/2.25.1 setuptools/52.0.0 requests-toolbelt/0.9.1 tqdm/4.57.0 CPython/3.9.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9613d0bed7d0f0d08deb6e673fa1949f158b39ca0e4a23d2d4351617a7674cd1 |
|
MD5 | c6f1baa49e4b997f0c00583ba57ebe34 |
|
BLAKE2b-256 | 51139b3b465acc9b17b1fc79962db2d0763b8aca83e5d9988539c6c35ef10723 |