Skip to content

Code for my blog post on using S2E for malware analysis

Notifications You must be signed in to change notification settings

adrianherrera/malware-s2e

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Analysing "Trigger-based" Malware with S2E

This code accompanies my Analysing "Trigger-based" Malware blog post and slides.

Both directories should be copied into the windows directory of the guest-tools repo in your S2E environment, located at $S2EDIR/source/s2e/guest/windows.

Open the s2e.sln solution in Visual Studio and add the malware-inject, GetLocalTime-hook and wannacry-hook projects to the s2e solution.

The GetLocalTime-test project can be used to test symbolic execution of GetLocalTime. GetLocalTime-test is a stand-alone project and does not have to be added to the s2e solution.

About

Code for my blog post on using S2E for malware analysis

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published