xencrypt | A PowerShell script anti-virus evasion tool | Command Line Interface library
kandi X-RAY | xencrypt Summary
kandi X-RAY | xencrypt Summary
A PowerShell script anti-virus evasion tool
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of xencrypt
xencrypt Key Features
xencrypt Examples and Code Snippets
Community Discussions
Trending Discussions on xencrypt
QUESTION
I can extract symbols using the "nm -a -D" command.
But is there a way to extract the symbol names with an offset from the start of the file?
For example,
...ANSWER
Answered 2019-Jul-28 at 17:06But is there a way to extract the symbol names with an offset from the start of the file?
There sure is: nm
is doing it (in order to print the names).
You should be aware that there could be two symbol tables: a regular one and a dynamic one (nm -D
displays the latter).
The symbols themselves are stored in .dynsym
section (or .symtab
section for the regular symbol table), and they contain the offset into .dynstr
section (which actually contains the names).
So adding ".dynstr".sh_offset
+ "symbol".st_name
will give you offset of the symbol name in the file.
Sample code here. (The code uses .symtab
and .strtab
; you'll need to adjust it to use .dynsym
and .dynstr
to print the dynamic symbol table.)
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install xencrypt
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page