https://github.com/minj-ae/banalyzer-cmdi
[Sunrin Security Project] Command Injection Static Analyzer with IDAPython
https://github.com/minj-ae/banalyzer-cmdi
command-injection ida python reverse-engineering static-analysis sunrin
Last synced: about 1 year ago
JSON representation
[Sunrin Security Project] Command Injection Static Analyzer with IDAPython
- Host: GitHub
- URL: https://github.com/minj-ae/banalyzer-cmdi
- Owner: minj-ae
- License: apache-2.0
- Created: 2023-11-25T00:47:40.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-12-03T06:33:32.000Z (over 2 years ago)
- Last Synced: 2025-01-12T13:29:48.494Z (about 1 year ago)
- Topics: command-injection, ida, python, reverse-engineering, static-analysis, sunrin
- Language: Python
- Homepage:
- Size: 12.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Banalyzer CMDI
[Sunrin Security Project]
Develop Static Analyzer with IDAPython coded by KIM MIN JAE

## Screenshot

## Environment
- Tested on IDA Pro 7.7
- Require >= Python 3.8
## Features
- Detects command injection, path traversal using trace scope after discovering vulnerable functions
- Supports Advanced GUI
### Install
#### On Windows
- Check [here](https://www.python.org/downloads/)
#### On Mac OS
brew install python
### Usage
Open IDA script window (shift+f2) (mode: python), import and run!
### To-do
Modify after accepting feedback