SZpy is based on z3 with Symbolic Execution inspired by Diary of a reverse-engineer. The aim of this tool is to improve the PoC present in Breaking Kryptonite's Obfuscation: A Static Analysis Approach Relying on Symbolic Execution. There's a simple difference between ZSpy and the PoC: SZpy is not based on IDA.
Whenever a function is compiled with static llvm and you're too lazy to analyze it manually.
You need python2.7
and if you want to use the associated disassembler you need to install capstone
python version. Then you can clone SZpy:
$ git clone https://github.com/dariosharp/SZpy.git
Now are only supported i386 and x86-64 but will be available in the near future more architectures.
View EXECUTE.md
.
Myself dariosharp, if you are interested in the project please contact me on twitter or GitHub.