BinAbsInspector
BinAbsInspector copied to clipboard
BinAbsInspector: Vulnerability Scanner for Binaries
在进行分析的过程中遇见代码符号相关异常:
   ghidra version: 10.1.2 BinAbslnspector: 10.1.2 Z3 version :z3-4.8.17-x64-win 解析文件: $ file NDynSover.exe NDynSover.exe: PE32+ executable (console) x86-64, for MS Windows file test.exe test.exe: PE32+ executable (DLL) (console)...
processConstraints()中只传入了inOutEnv,当conditionVarnode是tmp变量时,无法从inOutEnv中获取相应的值集。或许应该把tmpEnv传进函数,然后调用KSet conditionKSet = getKSet(conditionVarnode,inOutEnv,tmpEnv,pcode);?
我测试使用headless模式和GUI模式对同一个应用进行测试,但是测试结果不一样,GUI模式显示发现14个warn;headless模式有100多条这样的数据:{"timestamp":"2022-07-19T03:33:00","level":"WARN","logger":"CWE","message":"CWE787: Stack Out-of-Bound Write @ 0010f193 [ ]"}。请问这是什么原因
I have successfully run this script in my project for some time, but I can only view the problems found according to the console output. I want to know if...
I just found this work, it is really interesting and fantastic. I have tested it on several binaries and the results are great. But I have issues when performing on...
I expect this command injection vulnerability FUN_000109f4 to be detected. And I expect this Stack Overflow vulnerability FUN_00010d78 to be detected. [test1.cgi.zip](https://github.com/KeenSecurityLab/BinAbsInspector/files/8587853/test1.cgi.zip)

您好,我使用docker方式进行搭建这个程序,在分析一个elf文件的时候出现这种错误,请问大佬如何解决  docker run -v $(pwd):/data/workspace bai "@@" -import test openjdk version "11.0.11" 2021-04-20 OpenJDK Runtime Environment AdoptOpenJDK-11.0.11+9 (build 11.0.11+9) OpenJDK 64-Bit Server VM AdoptOpenJDK-11.0.11+9 (build 11.0.11+9, mixed mode) INFO...
Don't know why, I meet this error: ``` INFO REPORT: Analysis succeeded for file: /test3 (HeadlessAnalyzer) INFO SCRIPT: /bai/ghidra_10.1.2_PUBLIC/Ghidra/Extensions/BinAbsInspector/ghidra_scripts/BinAbsInspector.java (HeadlessAnalyzer) Loaded config: Config{z3TimeOut=1000, isDebug=false, isOutputJson=true, K=50, callStringK=3, checkers=[CWE676, CWE78, CWE467,...