1. 5

  2. 1

    This is really cool; I’ve wanted to start using rr with some of the blackbox/adversarial assessments I do, esp. when we’re able to exfiltrate binaries from systems (right now, it’s a lot of Ida/gdb/whathaveyou). Obviously limited to x86, but really neat none-the-less.

    Anyone using this for malware/RE yet and have experiences to share?