reverse engineering
2.75K subscribers
41 photos
9 videos
22 files
76 links
◉ A channel for learning and discussing about reverse engineering

◉ We aren't accepting any illegal works, we are here to help, learn and gain new skills
◉ Owner @Mohamed_Abozaid1
◉ Egypt 🇪🇬

Please don't PM ask in discussion group except in necessity
Download Telegram
Sir Mohamed Fathy had started a great playlist in Android security for free on YouTube
unfortunately it is in Arabic so not all people will find that useful

https://youtube.com/playlist?list=PLhgtN5PV5kNRNzE4BiFBxSDcih4eiUymb
12👎3👍2💔1
▲Security Threat

This phishing email is sent to a lot of people who have repository on github saying that your email is logged in from a device in Iceland 🇮🇸 asking you to change your password or review your activity after that they can takeover your account

That email is well crafted so be careful
Please don't click on any links

◉ Keep safe @reverseengineer101
👍158😱4
The European Union has released their own linux distro Eu-OS based fedora distribution

https://eu-os.gitlab.io/
🤡11🤨6🥴1
APKLEAKS

• apkleaks is a powerful tool (based on Jadx) to extract :

secrets from apk
URLs/endpoints
IP adresses
▲ general info about the authorization
more and more

• apkleaks supports :
JSON output format
ⓘ Custom patterns/outputs
ⓘ Windows/Linux/Android(Termux)

installation :
▲ Docker
docker pull dwisiswant0/apkleaks:latest

▲ pip/pip3
pip3 install apkleaks

▲ git
git clone https://github.com/dwisiswant0/apkleaks

cd apkleaks/

pip3 install -r requirements.txt

Github : https://github.com/dwisiswant0/apkleaks

Shared by @reverseengineer101
13👍7👏2💯1
Forwarded from pancake
r2ai-hackbcn2025.pdf
1.7 MB
🔥83👍3
Waydroid

A container-based approach to boot a full Android system on regular GNU/Linux systems running Wayland based desktop environments.

https://waydro.id
🥰53👍2🔥2👏1💯1
Activaite windows to cross 😂
🤣27👍4😁4🔥2🤬2
GDA(GJoy Dex Analyzer)
Is a great tool for android apks analysis and reverse engineering, also a great alternative of Jadx-gui since it's so fast (based on C++)

https://github.com/charles2gan/GDA-android-reversing-Tool
7👏2👍1
If you have trouble with programs or exe that only runs on Windows while you are using Linux
You can simply use wine to run these on your linux machine

Wine (originally an acronym for "Wine Is Not an Emulator") is a compatibility layer capable of running Windows applications on several POSIX-compliant operating systems, such as Linux, macOS, & BSD. Instead of simulating internal Windows logic like a virtual machine or emulator, Wine translates Windows API calls into POSIX calls on-the-fly, eliminating the performance and memory penalties of other methods and allowing you to cleanly integrate Windows applications into your desktop.


Official website : https://www.winehq.org/

You can use apt to install as well (I tested on Debian based distros)
@reverseengineer101
🔥4
APKWeaker : https://github.com/Dark-Night0/APKWeaker

APKWeaker is a command-line tool designed to simplify the process of modifying Android APKs for testing and debugging purposes It automates the process of pulling APKs from the Android emulator, decompiling them, injecting networkSecurityConfiguration into the base.apk if the application uses Split Packages to allow ClearTextTraffic (HTTP), forcing the application to trust a certificate (user, system), rebuilding the APKs, and signing them for reinstallation
👍94🥰2
Jwt_tool crack and attack json web tokens
Its functionality includes:
Checking the validity of a token
Testing for known exploits:
(CVE-2015-2951) The alg=none signature-bypass vulnerability
(CVE-2016-10555) The RS/HS256 public key mismatch vulnerability
(CVE-2018-0114) Key injection vulnerability
(CVE-2019-20933/CVE-2020-28637) Blank password vulnerability
(CVE-2020-28042) Null signature vulnerability
(CVE-2022-21449) Psychic Signature ECDSA vulnerability
Scanning for misconfigurations or known weaknesses
Fuzzing claim values to provoke unexpected behaviours
Testing the validity of a secret/key file/Public Key/JWKS key
Identifying weak keys via a High-speed Dictionary Attack
Forging new token header and payload contents and creating a new signature with the key or via another attack method
Timestamp tampering
RSA and ECDSA key generation, and reconstruction (from JWKS files)
Rate-limiting for all attacks
...and lots more!


https://github.com/ticarpi/jwt_tool
5👍3🥰2🥱1
Forwarded from pancake
a new release of the reai plugin is out
🔥2🥰1
Exodia OS

A highly customized arch-based distro For All Cybersecurity fields

https://exodia-os.github.io
😁4👍3🔥21
Company : we have a great security system, we can't be hacked

The HR just won an iPhone ...
😂 😂 😂
1🤣27😁113😈1
https://www.darkentry.net

Check your email's or work's email password if it has been breached for free without registration

This check is based on hackers data bases and what's leaked on dark web

Dark entry is a trusted source and they are monitoring the dark web as well so if you have your own company they can help you, managed by Ebrahem Hegazy

Post by, @reverseengineer101
9