This is really cool; I’ve wanted to start using rr with some of the blackbox/adversarial assessments I do, esp. when we’re able to exfiltrate binaries from systems (right now, it’s a lot of Ida/gdb/whathaveyou). Obviously limited to x86, but really neat none-the-less.
Anyone using this for malware/RE yet and have experiences to share?
This is really cool; I’ve wanted to start using
rrwith some of the blackbox/adversarial assessments I do, esp. when we’re able to exfiltrate binaries from systems (right now, it’s a lot of Ida/gdb/whathaveyou). Obviously limited to x86, but really neat none-the-less.Anyone using this for malware/RE yet and have experiences to share?