-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.xml
72 lines (57 loc) · 4.23 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Go Reverse Engineering Tool Kit</title>
<link>/</link>
<description>Recent content on Go Reverse Engineering Tool Kit</description>
<generator>Hugo -- gohugo.io</generator>
<language>en-US</language>
<lastBuildDate>Sun, 18 Aug 2019 00:00:00 +0000</lastBuildDate>
<atom:link href="/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>About</title>
<link>/about/</link>
<pubDate>Sun, 18 Aug 2019 00:00:00 +0000</pubDate>
<guid>/about/</guid>
<description>What is it? The Go Reverse Engineering Tool Kit (go-re.tk) is a new open-source toolset for analyzing Go binaries. The tool is designed to extract as much metadata as possible from stripped binaries to assist in both reverse engineering and malware analysis. For example, GoRE can detect the compiler version used, extract type information, and recover function information, including source code line numbers for functions and source tree structure.</description>
</item>
<item>
<title>GoRE</title>
<link>/gore/</link>
<pubDate>Sun, 14 Jul 2019 00:00:00 +0000</pubDate>
<guid>/gore/</guid>
<description>A Go package for analyzing Go binaries GoRE is the core of Go Reverse Engineering Tool Kit. It is a library written in Go that provides functionality to analyze binaries produced by the Go compiler. API documentation is available on godoc.org.
How to use Use go get -u github.com/goretk/gore to download the library. Import it into your project. Write a new cool tool. For an example use case, please checkout redress.</description>
</item>
<item>
<title>Libgore</title>
<link>/libgore/</link>
<pubDate>Sun, 14 Jul 2019 00:00:00 +0000</pubDate>
<guid>/libgore/</guid>
<description>Open up GoRE to other languages Libgore is a dynamic C-library for interacting with GoRE. It is using cgo to produce a translation layer between the code written in Go and the exported C functions. With this library, it is possible to write bindings for other languages that have C foreign function interface (FFI) support. PyGoRE uses this dynamic library to provide a Python library that can be used to write tools in Python.</description>
</item>
<item>
<title>pyGoRE</title>
<link>/pygore/</link>
<pubDate>Sun, 14 Jul 2019 00:00:00 +0000</pubDate>
<guid>/pygore/</guid>
<description>Python library for analyzing Go binaries PyGoRE is a simple to use Python library for analyzing Go binaries compiled with Go compiler.
How to use Use pip install pygore to download and install the library. Import it into your project. Write a new cool tool. Sample code import pygore testfile = '/path/to/go/binary/file' f = pygore.GoFile(testfile) c = f.get_compiler_version() print('Compiler: {}\nTimestamp: {}\nSHA {}\n'. format(c.name, c.timestamp, c.sha)) pkgs = f.</description>
</item>
<item>
<title>Redress</title>
<link>/redress/</link>
<pubDate>Sun, 14 Jul 2019 00:00:00 +0000</pubDate>
<guid>/redress/</guid>
<description>A tool for analyzing stripped binaries The redress software is a tool for analyzing stripped Go binaries compiled with the Go compiler. It extracts data from the binary and uses it to reconstruct symbols and performs analysis. It essentially tries to &ldquo;re-dress&rdquo; a &ldquo;stripped&rdquo; binary. It can be downloaded from its GitHub page.
It has two operation modes. The first is a standalone mode where the binary is executed on its own.</description>
</item>
<item>
<title>Home</title>
<link>/home/</link>
<pubDate>Fri, 14 Jun 2019 00:00:00 +0000</pubDate>
<guid>/home/</guid>
<description>A Reverse Engineering Tool Kit for Go, Written in Go. The Go Reverse Engineering Tool Kit (go-re.tk) is a new open-source toolset for analyzing Go binaries. The tool is designed to extract as much metadata as possible from stripped binaries to assist in both reverse engineering and malware analysis.</description>
</item>
</channel>
</rss>