A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Dec 16, 2021
{{ message }}
The process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction.
A collection of various awesome lists for hackers, pentesters and security researchers
An open-source x64/x32 debugger for windows.
Ghidra is a software reverse engineering (SRE) framework
A collection of hacking / penetration testing resources to make you better!
Is your feature request related to a problem? Please describe.
Quick shellcode loading via the Cutter gui.
Describe the solution you'd like
Paste shellcode and press + as an alternative to clicking 'OK'-button
Describe alternatives you've considered
None
The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
Reverse engineering WhatsApp Web.
Fork of https://code.google.com/archive/p/ipv6-hosts/, focusing on automation
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Android virtual machine and deobfuscator
Patch iOS Apps, The Easy Way, Without Jailbreak.
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
Build your own 'AirTags'
Describe the bug
Any call to
Desktop.browse(...)freezes Recaf on Linux machines with GNOME
To Reproduce
The Solution
From: https://stackoverflow.com/questions/23176624/javafx-freeze-on-desktop-openfile-desktop-browseuri
if( Desktop.isDesktopSupported() )
{
new TReverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Program for determining types of files for Windows, Linux and MacOS.
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
Disassembly of Pokémon Red/Blue
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Should just print the symbol name in the current offset.
like is. or isq., but only showing the name