Source Byte
7.79K subscribers
863 photos
73 videos
680 files
1.71K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Native code virtualizer for x64 binaries
[ GitHub ]

#reverse
5🤷‍♀21
Unveiling custom packers: A comprehensive guide
[ GitHub ]

#reverse
#packer
5🔥2
us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf
2.4 MB
#Blackhat
us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP

#packer #reverse
👍3🥰2🔥1
Manual Unpacking DotFix NiceProtect.rar
15.1 MB
Unpack DotFix Niceprotect

#unpacking
#reverse
4👍1
8.3.7z
852.4 MB
IDA Pro Version 8.3 (with tools, sdk + keygen for x86_x64, ARM, ARM64, PPC, PPC64, and MIPS decompilers! )

#ida
#reverse
12
Assembly for Hackers from Reza Rashidi

Table of contents
Syntax
Comments
Assembly Language Statements
Syntax of Assembly Language Statements
Example: Hello World Program in Assembly
Compiling and Linking
Sections
Processor Registers
System Calls
Strings
String Instructions
Repetition Prefixes
Numbers
BCD Representation
Instructions:
Conditions
CMP Instruction
Conditional Jump Instructions (Signed Data)
Conditional Jump Instructions (Unsigned Data)
Special Conditional Jump Instructions
Addressing Modes
MOV Instruction
File Handling
Example: Reading from a File
Stack and Memory
Stack and Memory
Tools for Analysis
Code Injection Attack
DLL Injection
APC Injection
Valid Accounts
System Binary Proxy Execution: Rundll32
Reflective code loading
Modify Registry
Process Injection
Mark-Of-The-Web (MOTW) Bypass
Access Token Manipulation
Hijack Execution Flow
Resources

https://redteamrecipe.com/assembly-for-hackers

#assembly
#reverse
153👨‍💻1👀1👾1
Forwarded from Infosec Fortress
Skochinsky - Recon (2011) - Practical C++ Decompilation
#reverse
#binary
#slides
———
🆔 @Infosec_Fortress
🔥2👍1
Forwarded from Infosec Fortress
Recon-2011-Skochinsky.pdf
794 KB
4👍1
Forwarded from Infosec Fortress
Cindy Xiao - Reversing Rust Binaries
#binary
#reverse
#slides
———
🆔 @Infosec_Fortress
👍3
Forwarded from Infosec Fortress
Reversing_Rust_Binaries_One_Step_Beyond_Strings_Cindy_Xiao_NorthSec.pdf
73.2 MB
5👏2
⎙ Learning Symbolic analysis (Angr)

Samples
⎗ First Write-ups
⎗ Second Write-ups


@source_byte
#reverse #Hunting #angr
3👍1🔥1🥰1
INTRODUCTION TO GO REVERSING_bhack_2021_alexandreb.pdf
3.6 MB
Blackhat 2021

--------------------
Related:
AlphaGolang | A Step-by-Step Go Malware Reversing Methodology for IDA Pro
Reversing Golang



#reverse #golang
6👾1
The Enigma_7.40 _x86_x64.7z
52.9 MB
The Enigma 7.40 x86 & x64
#packer #protector #reverse


Thanks to Sh4doVV
👍11
Forwarded from [ deprecated_bytes ]
#reverse #IDA #hardware #research

.title
Mouse Adventures

.text
Wherein I delve into the internals of my no-name brand "Tecknet Hypertrak Gaming Mouse" in an attempt to write a cross-platform tool that can manipulate its configuration without having to use the awful Windows-only tool it's shipped with. In this first part we tear apart said tool to figure out how it communicates with the mouse.

.comment
Practical field story about "simple" hardware reverse engineering. Part 7 is noticeable as rare info about IDA's processor module creation.


.data
#1: Introduction
#2: Extracting the Firmware
#3: Writing a Disassembler
#4: Writing a custom tool
#5: Dumping and Parsing the USB Descriptors
#6: Enabling the Bootloader
#7: Writing an IDA Processor Module
#8: Dissecting the USB Code and Unbricking the Mouse

[ deprecated_bytes ]
3👍1
Forwarded from Cafe Security (Mohammad)
Architecture Analysis of VMProtect 3.8

The focus will be on the new architecture for the latest VMProtect and techniques for attacking or reversing protected binaries. I will demonstrate how reverse engineering techniques—such as symbolic execution and binary instrumentation—can facilitate the de-virtualization or de-obfuscation of the protected code.

https://youtu.be/IMUUjTJzmFI?si=I02CASpsIo_w6G1B

#binary
#reverse
#vmp
#conference
@cafe_security
5
Forwarded from Sec Note
"It’s a pleasure and an honor to present to you once again."

#avast #av #reverse
8🔥3👏3