A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Oct 4, 2020
{{ message }}
The process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction.
A collection of various awesome lists for hackers, pentesters and security researchers
An open-source x64/x32 debugger for windows.
Ghidra is a software reverse engineering (SRE) framework
A collection of hacking / penetration testing resources to make you better!
Is your feature request related to a problem? Please describe.
It'll be nice to have a hotkey (like H in IDA) to toggle the integer base between HEX and DEC. Since it may not work in Decompiler without backend support, having it in Disassembly/Graph will still be nice.
Describe the solution you'd like
So when I press the hotkey (maybe H if it's available), it should work like
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ
CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
Reverse engineering WhatsApp Web.
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
Fork of https://code.google.com/archive/p/ipv6-hosts/, focusing on automation
Android virtual machine and deobfuscator
Patch iOS Apps, The Easy Way, Without Jailbreak.
An Information Security Reference That Doesn't Suck
A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM.
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
GEF - GDB Enhanced Features for exploit devs & reversers
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
Disassembly of Pokémon Red/Blue
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Perl / PHP / Python / Ruby
Reverse engineering framework in Python
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Tutorials, tools, and more as related to reverse engineering video games.
Currently it's possible to list possible variable values in the CLI with
e search.in=?.But in
Vevisual configuration options navigator the feature is missing: