inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
Supports: VMWare (client/servers), XEN and physical systems (PAGEDUMP).
Users can manage their own "golden images" of secure hashes used to ensure no byte slipps through the cracks of a forensic, reverse engineering, sandbox analysis or host integrity monitoring operation.
We've recently added cloud hosted bitmaps and are expanding this to allow users to use the integrity funtionality without having to construct a database first.
The block based integrity checks occur at a configurable size and will isolate very small code patches quickly.
Integrity checking provides confidence to useres that they have analyzed "everything" and they have not wasted time looking in the wrong plaes.
An IronPython shell is able to use native type reflection that allwos for reading and writing physical memory dumps. Test a new kernel patch or improve inVtero itself. (e.g. edit _EPROCESS objects from python and write them back to a VM image then resume exection to observe DMA style hacking with very easy scripts that map 1:1 to known symbol sources)
Recent modules include a Gargoyle detection mechanism that uses the type information extracted from the systems to allow for an exhaustive verification of thread stack states that can detect the preseanse of RoP type weird machienes.
A goal of the project is to provide high quality assurace as quickly as possiable. To avoid the common pitfall of many debuggers and forensic platforms that are trivially compromised.
https://github.com/ShaneK2/inVtero.net