UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ #Reverse Engineering Tools

The following are some of the most popular reverse engineering tools:

HOWEVER! GO TO THE REVERSE ENGINEERING SECTION for more references.

[Ghidra](https://ghidra-sre.org/) - a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate

Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, IDA Free.

[WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg.

OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.

[Radare2](http://rada.re/r/index.html) - Open source, crossplatform reverse engineering framework.

x64dbg - Open source x64/x32 debugger for windows.

[Immunity Debugger](http://debugger.immunityinc.com/) - Powerful way to write exploits and analyze malware.

Evan's Debugger - OllyDbg-like debugger for GNU/Linux.

[Medusa](https://github.com/wisk/medusa) - Open source, cross-platform interactive disassembler.

plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.

[peda](https://github.com/longld/peda) - Python Exploit Development Assistance for GDB.

dnSpy - Tool to reverse engineer .NET assemblies.

[binwalk](https://github.com/devttys0/binwalk) - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.

PyREBox - Python scriptable Reverse Engineering sandbox by Cisco-Talos.

[Voltron](https://github.com/snare/voltron) - Extensible debugger UI toolkit written in Python.

Capstone - Lightweight multi-platform, multi-architecture disassembly framework.

[rVMI](https://github.com/fireeye/rVMI) - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.

Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.


> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Reverse Proxy

- docker-flow-proxy - Reconfigures proxy every time a new service is deployed, or when a service is scaled. By @vfarcicvfarcic

- fabio - A fast, modern, zero-conf load balancing HTTP(S) router for deploying microservices managed by consul. By @magiconair (Frank Schroeder)

- Let's Encrypt Nginx-proxy Companion - A lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically. By @JrCs

- muguet - DNS Server & Reverse proxy for Docker environments. By @mattallty

- nginx-proxynginxproxy - Automated nginx proxy for Docker containers using docker-gen by @jwilderjwilder

- Swarm Ingress Router - Route DNS names to Swarm services based on labels. By @tpbowden

- Swarm Router - A «zero config» service name based router for docker swarm mode with a fresh and more secure approach. By @flavioaiello

- TræfΓ‰Βͺk - Automated reverse proxy and load-balancer for Docker, Mesos, Consul, Etcd... By @EmileVauge


> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘This really a good debugger for windows 64/32
#reverse

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Download a snapshot from GitHub, SourceForge or OSDN
> https://github.com/x64dbg/x64dbg

2) extract it in a location your user has write access to.

3) Optionally use x96dbg.exe to register a shell extension and add shortcuts to your desktop.

4) You can now run x32\x32dbg.exe if you want to debug a 32-bit executable or x64\x64dbg.exe to debug a 64-bit executable! If

5) you are unsure you can always run x96dbg.exe and chose your architecture there if win 64/or win 32 .

6) You can also compile x64dbg yourself with a few easy steps!


@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁