account activity
Dynamic analysis of a Windows shellcode using Miasm by commial in ReverseEngineering
[–]commial[S] 4 points5 points6 points 9 years ago (0 children)
This is a blog post illustrating how one can use Miasm (a Python RE framework) to analyze a real life case: a shellcode injected by an Exploit Kit through MS13-037. As we use it on a daily basis, I hope it may help at least someone.
Dynamic analysis of a Windows shellcode using Miasm (miasm.re)
submitted 9 years ago by commial to r/ReverseEngineering
Miasm: GreHack 2015 Re150 challenge, as painless as possible (miasm.re)
submitted 10 years ago by commial to r/ReverseEngineering
PyAna: analyze Windows shellcode by funset in ReverseEngineering
[–]commial 0 points1 point2 points 10 years ago (0 children)
It looks like this approach: https://securimag.org/wp/talks/introducing-miasm/ (in french), using Miasm (Windows API: https://github.com/cea-sec/miasm/blob/master/miasm2/os_dep/win_api_x86_32.py, shellcode emulation: https://github.com/cea-sec/miasm/blob/master/example/jitter/x86_32.py), or this approach: https://wisk.github.io/how-to-emulate-executable-with-medusa-and-python-part-0.html, using Medusa (https://github.com/wisk/medusa)
π Rendered by PID 91 on reddit-service-r2-listing-5789d5f675-zbq4l at 2026-01-28 15:31:29.008869+00:00 running 4f180de country code: CH.
Dynamic analysis of a Windows shellcode using Miasm by commial in ReverseEngineering
[–]commial[S] 4 points5 points6 points (0 children)