A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
May 18, 2020
A collection of various awesome lists for hackers, pentesters and security researchers
Is your feature request related to a problem? Please describe.
In the current api documentation classes from external libraries are displayed with their full package name. This leaves the user to search for the documentation for the external library themselves for which they must also find the correct version number.
Describe the solution you'd like
It would be nice to have the extern
Extended Binary Coded Decimal Interchange Code (EBCDIC; /ˈɛbsɪdɪk/) is an eight-bit character encoding used mainly on IBM mainframe and IBM midrange computer operating systems. It descended from the code used with punched cards and the corresponding six-bit binary-coded decimal code used with most of IBM's computer peripherals of the late 1950s and early 196
would you mind showing developers how to use apktool as api,you know there are many people use this tool to analyse apks in server,we dont need an jar file to use and we want to use api .Although we learn the whole code about apktool,we sincerely hope you guys can provide a doc to developer to show how to use apktool like useing api
A collection of hacking / penetration testing resources to make you better!
Is your feature request related to a problem? Please describe.
Currently when opening a context menu using keyboard in disassembly widget or graph widget it opens generic widget context menu as if user right clicked outside any instructions.
Describe the solution you'd like
Opening context menu using keyboard in those widgets should open the dissaembly context menu for current pos
Describe the issue
Needle doesn't seem to be maintained anymore. The last update was > 1 year and no issues have been answered this year. It also doesnt' seem to work on iOS JB devices with Chimera. FSecureLABS/needle#273
We should review where we use Needle and if other tools are a better alternative (e.g. objection, passionfruit).
https://github.com/Co2333/coreBase/blob/master/OneMonkey.sh
It will auto install following thing with out any issues, easy for beginners:
HomeBrew
wget
ldid
ldid2
dpkg
libimobiledevice
libimobileinstaller
python
THEOS
MonkeyDev
frida-tools
frida-ios-dump
It will auto swip the localhost to user ip and also ios device ssh password
After install, run this py like
username$ fri
urrently I do not know the structure of the payload that should be sent to the server, in the documentation they speak of 3 paramatros [description, attributes, content] but the model whatsapp_binary_writter that triggers an error and closes the connection
刚才试着用update_hosts.py更新了一次,发现有不少用于DNS污染的错误的IP没有被过滤出来。
比如:
| IPv6查询结果 | 域名 | IP实际所有者 |
|---|---|---|
| 31.13.64.33 | www.google.com | |
| 208.101.60.87 | encrypted.google.com | SoftLayer |
| 69.171.230.18 | google.com.hk | |
| 64.13.192.76 | accounts.google.com.hk | Media Temple |
| 31.13.68.22 | clients1.google.com.hk | |
| 69.63.180.173 | mobile.google.com.hk | |
| 208.1 |
Env:
Repro:
import capstone
md = capstone.Cs(capstone.CS_ARCH_X86, capstone.CS_MODE_32)
md.detail = True
# case 1
# expected: fstcw WORD PTR [ebp-0x4] (based on Objdump disassembly which round-trips with GNU as)
for insn in md.disasm(b"\x9B\xD9\x7D\xFC", 0):
print(insn.address, insn.mnemonic, insn.op_str)
print(COPYING and README claim this is GPL, but it doesn't specify which version exactly? It looks like GPLv2, the question is: "GPLv2 only" or "GPLv2 or later"?
The current uc.c only contains a copyright where it's unclear wether that file also belongs to GPL'd code.
The source files or README should contain [the license text as per COPYING file](https://github.com/unicorn-engine/unicorn/blob/master/CO
Patch iOS Apps, The Easy Way, Without Jailbreak.
Right now the process isn't documented and is done by calling different classes in the project. Make a gradle task and document it a bit to make it easier for people to update it themselves.
Related discussion: CalebFenton/simplify#57
An Information Security Reference That Doesn't Suck
Does anyone uses the AST feature of thje decompiler, i.e. this one:
from pprint import pprint
from androguard.decompiler.dad.decompile import DvMethod
for method in dx.get_methods():
if method.is_external():
continue
dv = DvMethod(method)
dv.process(doAST=True)
pprint(dv.get_ast())
I would really like to see a usecase for this and some code how it is ac
GEF - GDB Enhanced Features for exploit devs & reversers
As of GDB 8.3 RISCV is supported.hope add basic support for RISC-V
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Hi,
I know I am reopening an old discussion that has been already discussed here (#1032 or #162), but this is the one thing that make miasm hard to use. So I wonder if the issue with it is :
If it is 1, I think it should be possible to have some other people involved and
iOS版微信抢红包Tweak
Kaitai Struct uses a specific JSON schema for test output.
I want to target it directly from my target language (Nim) but it is not documented anywhere.
After some experimenting I found out the following keys are supported:
Questions:
elapsed mean?Tutorials, tools, and more as related to reverse engineering video games.
A completely free, open source and online course about Reverse Engineering iOS Applications.
Reversing Google's 3D satellite mode
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Add a description, image, and links to the reverse-engineering topic page so that developers can more easily learn about it.
To associate your repository with the reverse-engineering topic, visit your repo's landing page and select "manage topics."
add please to sdk