A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Oct 4, 2020
{{ message }}
The process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction.
A collection of various awesome lists for hackers, pentesters and security researchers
An open-source x64/x32 debugger for windows.
Ghidra is a software reverse engineering (SRE) framework
A collection of hacking / penetration testing resources to make you better!
Is your feature request related to a problem? Please describe.
It'll be nice to have a hotkey (like H in IDA) to toggle the integer base between HEX and DEC. Since it may not work in Decompiler without backend support, having it in Disassembly/Graph will still be nice.
Describe the solution you'd like
So when I press the hotkey (maybe H if it's available), it should work like
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ
CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
Reverse engineering WhatsApp Web.
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
Fork of https://code.google.com/archive/p/ipv6-hosts/, focusing on automation
Android virtual machine and deobfuscator
Patch iOS Apps, The Easy Way, Without Jailbreak.
An Information Security Reference That Doesn't Suck
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
GEF - GDB Enhanced Features for exploit devs & reversers
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
Disassembly of Pokémon Red/Blue
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Reverse engineering framework in Python
Tutorials, tools, and more as related to reverse engineering video games.
Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Perl / PHP / Python / Ruby
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
A completely free, open source and online course about Reverse Engineering iOS Applications.
Work environment