A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Mar 7, 2022
{{ message }}
The process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction.
A collection of various awesome lists for hackers, pentesters and security researchers
Ghidra is a software reverse engineering (SRE) framework
We have cd,pwd already, those two can be useful for scripts
A collection of hacking / penetration testing resources to make you better!
Environment information
**Describe the
The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
Reverse engineering WhatsApp Web.
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
Build your own 'AirTags'
Fork of https://code.google.com/archive/p/ipv6-hosts/, focusing on automation
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Android virtual machine and deobfuscator
Patch iOS Apps, The Easy Way, Without Jailbreak.
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
Describe the bug
Any call to
Desktop.browse(...)freezes Recaf on Linux machines with GNOME
To Reproduce
The Solution
From: https://stackoverflow.com/questions/23176624/javafx-freeze-on-desktop-openfile-desktop-browseuri
if( Desktop.isDesktopSupported() )
{
new TProgram for determining types of files for Windows, Linux and MacOS.
Qiling Advanced Binary Emulation Framework
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Disassembly of Pokémon Red/Blue
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Feature type
Quality of life
Describe the feature
I would like to be able to use relative paths in the launcher settings file to point to
x32dbg.exeandx64dbg.exerespectively. I've already tried editing the file manually and assuming my implementation (.\/\//) isn't wrong, the launcher seemingly refuses the use of relative paths.