A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Mar 7, 2022
{{ message }}
The process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction.
A collection of various awesome lists for hackers, pentesters and security researchers
Ghidra is a software reverse engineering (SRE) framework
A collection of hacking / penetration testing resources to make you better!
Environment information
**Describe the
The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
Reverse engineering WhatsApp Web.
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers
Build your own 'AirTags'
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Android virtual machine and deobfuscator
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
Patch iOS Apps, The Easy Way, Without Jailbreak.
When class/field/member modifier groups are displayed, its a stack of colored shapes.
It would be useful to have on-hover capabilities for these groups to complain the flags enabled in each group.
See AccessFlags for the list of all flags.
It would be u
Qiling Advanced Binary Emulation Framework
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Disassembly of Pokémon Red/Blue
Tutorials, tools, and more as related to reverse engineering video games.
Re-write of Injection for Xcode in (mostly) Swift
Feature type
Quality of life
Describe the feature
I would like to be able to use relative paths in the launcher settings file to point to
x32dbg.exeandx64dbg.exerespectively. I've already tried editing the file manually and assuming my implementation (.\/\//) isn't wrong, the launcher seemingly refuses the use of relative paths.