β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ #Reverse Engineering Tools
The following are some of the most popular reverse engineering tools:
HOWEVER! GO TO THE REVERSE ENGINEERING SECTION for more references.
[Ghidra](https://ghidra-sre.org/) - a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate
Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, IDA Free.
[WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg.
OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
[Radare2](http://rada.re/r/index.html) - Open source, crossplatform reverse engineering framework.
x64dbg - Open source x64/x32 debugger for windows.
[Immunity Debugger](http://debugger.immunityinc.com/) - Powerful way to write exploits and analyze malware.
Evan's Debugger - OllyDbg-like debugger for GNU/Linux.
[Medusa](https://github.com/wisk/medusa) - Open source, cross-platform interactive disassembler.
plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
[peda](https://github.com/longld/peda) - Python Exploit Development Assistance for GDB.
dnSpy - Tool to reverse engineer .NET assemblies.
[binwalk](https://github.com/devttys0/binwalk) - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
PyREBox - Python scriptable Reverse Engineering sandbox by Cisco-Talos.
[Voltron](https://github.com/snare/voltron) - Extensible debugger UI toolkit written in Python.
Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
[rVMI](https://github.com/fireeye/rVMI) - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ #Reverse Engineering Tools
The following are some of the most popular reverse engineering tools:
HOWEVER! GO TO THE REVERSE ENGINEERING SECTION for more references.
[Ghidra](https://ghidra-sre.org/) - a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate
Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, IDA Free.
[WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg.
OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
[Radare2](http://rada.re/r/index.html) - Open source, crossplatform reverse engineering framework.
x64dbg - Open source x64/x32 debugger for windows.
[Immunity Debugger](http://debugger.immunityinc.com/) - Powerful way to write exploits and analyze malware.
Evan's Debugger - OllyDbg-like debugger for GNU/Linux.
[Medusa](https://github.com/wisk/medusa) - Open source, cross-platform interactive disassembler.
plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
[peda](https://github.com/longld/peda) - Python Exploit Development Assistance for GDB.
dnSpy - Tool to reverse engineer .NET assemblies.
[binwalk](https://github.com/devttys0/binwalk) - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
PyREBox - Python scriptable Reverse Engineering sandbox by Cisco-Talos.
[Voltron](https://github.com/snare/voltron) - Extensible debugger UI toolkit written in Python.
Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
[rVMI](https://github.com/fireeye/rVMI) - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
h4cker/reverse_engineering/README.md at master Β· The-Art-of-Hacking/h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Reverse Proxy
- docker-flow-proxy - Reconfigures proxy every time a new service is deployed, or when a service is scaled. By @vfarcicvfarcic
- fabio - A fast, modern, zero-conf load balancing HTTP(S) router for deploying microservices managed by consul. By @magiconair (Frank Schroeder)
- Let's Encrypt Nginx-proxy Companion - A lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically. By @JrCs
- muguet - DNS Server & Reverse proxy for Docker environments. By @mattallty
- nginx-proxynginxproxy - Automated nginx proxy for Docker containers using docker-gen by @jwilderjwilder
- Swarm Ingress Router - Route DNS names to Swarm services based on labels. By @tpbowden
- Swarm Router - A ΓΒ«zero configΓΒ» service name based router for docker swarm mode with a fresh and more secure approach. By @flavioaiello
- TrΓΒ¦fΓΒͺk - Automated reverse proxy and load-balancer for Docker, Mesos, Consul, Etcd... By @EmileVauge
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Reverse Proxy
- docker-flow-proxy - Reconfigures proxy every time a new service is deployed, or when a service is scaled. By @vfarcicvfarcic
- fabio - A fast, modern, zero-conf load balancing HTTP(S) router for deploying microservices managed by consul. By @magiconair (Frank Schroeder)
- Let's Encrypt Nginx-proxy Companion - A lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically. By @JrCs
- muguet - DNS Server & Reverse proxy for Docker environments. By @mattallty
- nginx-proxynginxproxy - Automated nginx proxy for Docker containers using docker-gen by @jwilderjwilder
- Swarm Ingress Router - Route DNS names to Swarm services based on labels. By @tpbowden
- Swarm Router - A ΓΒ«zero configΓΒ» service name based router for docker swarm mode with a fresh and more secure approach. By @flavioaiello
- TrΓΒ¦fΓΒͺk - Automated reverse proxy and load-balancer for Docker, Mesos, Consul, Etcd... By @EmileVauge
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - vfarcic/docker-flow-proxy: Docker Flow Proxy
Docker Flow Proxy. Contribute to vfarcic/docker-flow-proxy development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACKERS GIFT :))
1οΈβ£#Reverse Enginnering Tools
- IDA Pro
- GDB
- Radare2
2οΈβ£#MQTT
- Introduction
- Hacking the IoT with MQTT
- thoughts about using IoT MQTT for V2V and Connected Car from CES 2014
- Nmap
- The Seven Best MQTT Client Tools
- A Guide to MQTT by Hacking a Doorbell to send Push Notifications
3οΈβ£#CoAP
- Introduction
- CoAP client Tools
- CoAP Pentest Tools
- Nmap
4οΈβ£#Automobile
- Introduction and protocol Overview
- PENTESTING VEHICLES WITH CANTOOLZ
- Building a Car Hacking Development Workbench: Part1
- CANToolz - Black-box CAN network analysis framework
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACKERS GIFT :))
1οΈβ£#Reverse Enginnering Tools
- IDA Pro
- GDB
- Radare2
2οΈβ£#MQTT
- Introduction
- Hacking the IoT with MQTT
- thoughts about using IoT MQTT for V2V and Connected Car from CES 2014
- Nmap
- The Seven Best MQTT Client Tools
- A Guide to MQTT by Hacking a Doorbell to send Push Notifications
3οΈβ£#CoAP
- Introduction
- CoAP client Tools
- CoAP Pentest Tools
- Nmap
4οΈβ£#Automobile
- Introduction and protocol Overview
- PENTESTING VEHICLES WITH CANTOOLZ
- Building a Car Hacking Development Workbench: Part1
- CANToolz - Black-box CAN network analysis framework
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
YouTube
How to Reverse Engineer with IDA Pro Disassembler Part1
π₯ Learn How to Reverse Engineer With IDA Pro Disassembler
π¨βπ» Buy Our Courses: https://guidedhacking.com/register/
π° Donate on Patreon: https://patreon.com/guidedhacking
β€οΈ Follow us on Social Media: https://linktr.ee/guidedhacking
π Article Link: httpsβ¦
π¨βπ» Buy Our Courses: https://guidedhacking.com/register/
π° Donate on Patreon: https://patreon.com/guidedhacking
β€οΈ Follow us on Social Media: https://linktr.ee/guidedhacking
π Article Link: httpsβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦This really a good debugger for windows 64/32
#reverse
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Download a snapshot from GitHub, SourceForge or OSDN
> https://github.com/x64dbg/x64dbg
2) extract it in a location your user has write access to.
3) Optionally use x96dbg.exe to register a shell extension and add shortcuts to your desktop.
4) You can now run x32\x32dbg.exe if you want to debug a 32-bit executable or x64\x64dbg.exe to debug a 64-bit executable! If
5) you are unsure you can always run x96dbg.exe and chose your architecture there if win 64/or win 32 .
6) You can also compile x64dbg yourself with a few easy steps!
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦This really a good debugger for windows 64/32
#reverse
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Download a snapshot from GitHub, SourceForge or OSDN
> https://github.com/x64dbg/x64dbg
2) extract it in a location your user has write access to.
3) Optionally use x96dbg.exe to register a shell extension and add shortcuts to your desktop.
4) You can now run x32\x32dbg.exe if you want to debug a 32-bit executable or x64\x64dbg.exe to debug a 64-bit executable! If
5) you are unsure you can always run x96dbg.exe and chose your architecture there if win 64/or win 32 .
6) You can also compile x64dbg yourself with a few easy steps!
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Android reverse analysis of a certain lock-up malware :
#Malwares #Reverse
https://undercode.help/android-reverse-analysis-of-a-certain-lock-up-malware/
#Malwares #Reverse
https://undercode.help/android-reverse-analysis-of-a-certain-lock-up-malware/
undercode.help
Android reverse analysis of a certain lock-up malware -
Recently, a batch of lock-up malware has emerged in the post bar in the interest of stopping streaming, and bar mates have struggled ...
π¦ Steps used by hackers to makes a path animation
#Reverse
https://undercode.help/steps-used-by-hackers-to-makes-a-path-animation/
#Reverse
https://undercode.help/steps-used-by-hackers-to-makes-a-path-animation/
undercode.help
Steps used by hackers to makes a path animation ? -
Everyone is no stranger to PPT mobile apps, and often people can use this kind of mobile apps to make certain ppts. Today, the outstanding hackers will introduce some methods and steps to make path animations using PPT. I hope everyone can start studyingβ¦