[Full-disclosure] Fwd: "Back with another one of those block rockin' beats"
- From: Henri Lindberg <henri+fulldisclosure@xxxxxxxxx>
- Date: Wed, 27 Oct 2010 21:59:02 +0300
Good news everyone!
nSense is releasing a tool which instruments executables during
runtime in order to extract code coverage data. This is done through
runtracing using runtime instrumentation.
Analyzing code coverage of large or self modifying executables with
various input files is a non-trivial task. This may result in the
analyst having several hundred thousand blocks of code and no
reasonable way of setting soft breakpoints on all of it
The tool is written in Python and is released under the Beerware license.
This tool release celebrates the t2'10 infosec conference, starting
08:30 @ 2010-10-28 EEST
If interested, you can find Blocks from nsense.fi / nsense.dk -> 31337 -> Tools
nSense Vulnerability Research
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: [Full-disclosure] CVE-2010-3700: Spring Security bypass of security constraints
- Next by Date: [Full-disclosure] nSense-2010-002: Teamspeak 2 Windows client
- Previous by thread: [Full-disclosure] CVE-2010-3700: Spring Security bypass of security constraints
- Next by thread: [Full-disclosure] nSense-2010-002: Teamspeak 2 Windows client