https://github.com/PiRogueToolSuite/ or on our website at https://pts-project.org/.
We have been working on another command for TLS encryption keys interception. This command pirogue-intercept-gated
automatically instruments all spawned processes. It is useful when it comes to dynamically instrument an application that spawns processes. This command also retrieve both socket and AES operations too.
Side note: on Android, when an app wants to spawn a new process, it delegates it to Zigote. Most app processes running on Android are spawned by Zygote.
We continue working on different aspects of Colander such as UI and analyzers.
Colander’s entry point is a case. Each case, which can correspond to an incident or an investigation, contains only the information (observable, artifacts…) that relate to it. Several people can collaborate on the same case. We have almost completely implemented the features related to the case management.
Colander comes with a set of modules for AV analysis, type-specific artifact analysis and observable enrichment. These analyzers are reusable are implemented in a separate service that can be deployed and used without Colander. The goal is to provide a generic REST API for quick an easy integration into other projects. Since 3rd-party services such as VirusTotal are often too expensive for NGOs, we try to provide analyzers that are not dependent on those external services.
For the moment, we have implemented the TLS traffic decryption. The UI is largely perfectible but here is an overview:
We have published an overview of the different activities done this year, feel free to check out our review of 2022.
We are facing issues on the packaging of the latest version of Frida. Find more details at https://github.com/PiRogueToolSuite/pirogue-os/issues/18.