🦑Reverse Engineering with Ghidra :
https://youtu.be/d4Pgi5XML8E (Part 1)
https://youtu.be/uyWVztMHWtk (Part 2)
https://youtu.be/RFG5FuqY0CE (Part 3)
https://youtu.be/5QBXNF7FKxM (Part 4)
https://youtu.be/d4Pgi5XML8E (Part 1)
https://youtu.be/uyWVztMHWtk (Part 2)
https://youtu.be/RFG5FuqY0CE (Part 3)
https://youtu.be/5QBXNF7FKxM (Part 4)
YouTube
HackadayU: Reverse Engineering with Ghidra Class 1
This is Class 1 in Reverse Engineering with Ghidra taught by Matthew Alt.
Learn with us: https://www.hackaday.io/u
Playlist for the Reverse Engineering with Ghidra series:
https://www.youtube.com/playlist?list=PL_tws4AXg7auglkFo6ZRoWGXnWL0FHAEi
0:00 - Presentation…
Learn with us: https://www.hackaday.io/u
Playlist for the Reverse Engineering with Ghidra series:
https://www.youtube.com/playlist?list=PL_tws4AXg7auglkFo6ZRoWGXnWL0FHAEi
0:00 - Presentation…
🦑Evaluating and comparing machine learning (ML) and artificial intelligence (AI) algorithms at scale.
- Custom evaluation protocols: Supports different evaluation phases, dataset splits, and metrics, with both public and private leaderboards.
- Remote evaluation: For large-scale challenges requiring special compute capabilities, EvalAI allows organizers to add worker nodes to process submissions.
- Evaluation inside environments: Submissions are evaluated in Docker containers, ensuring a consistent environment.
- CLI support: The
- Portability and scalability: Built on open-source technologies like Docker, Django, Node.js, and PostgreSQL for easy deployment and scalability.
- Faster evaluation: Optimization techniques like dataset chunking and multi-core processing speed up evaluations.
For installation, EvalAI can be set up using Docker with the following steps:
1. Install Docker and Docker Compose.
2. Clone the source code from the repository:
3. Build and run the Docker containers:
4. Access the platform at
Default users include:
- SUPERUSER: username: admin, password: password
- HOST USER: username: host, password: password
- PARTICIPANT USER: username: participant, password: password
- Custom evaluation protocols: Supports different evaluation phases, dataset splits, and metrics, with both public and private leaderboards.
- Remote evaluation: For large-scale challenges requiring special compute capabilities, EvalAI allows organizers to add worker nodes to process submissions.
- Evaluation inside environments: Submissions are evaluated in Docker containers, ensuring a consistent environment.
- CLI support: The
evalai-cli tool extends the platform’s capabilities to the command line.- Portability and scalability: Built on open-source technologies like Docker, Django, Node.js, and PostgreSQL for easy deployment and scalability.
- Faster evaluation: Optimization techniques like dataset chunking and multi-core processing speed up evaluations.
For installation, EvalAI can be set up using Docker with the following steps:
1. Install Docker and Docker Compose.
2. Clone the source code from the repository:
git clone https://github.com/Cloud-CV/EvalAI.git evalai && cd evalai
3. Build and run the Docker containers:
docker-compose up --build
4. Access the platform at
http://127.0.0.1:8888.Default users include:
- SUPERUSER: username: admin, password: password
- HOST USER: username: host, password: password
- PARTICIPANT USER: username: participant, password: password
🦑Legit Win 11 Activator:
@ECHO off
cls
:: Prompt for the product key
set /p productKey="Enter your Windows 11 product key: "
:: Set the product key and install it
cscript slmgr.vbs /ipk %productKey%
:: Activate Windows with the Microsoft servers
cscript slmgr.vbs /ato
:: Check activation status
cscript slmgr.vbs /dli
pause
@ECHO off
cls
:: Prompt for the product key
set /p productKey="Enter your Windows 11 product key: "
:: Set the product key and install it
cscript slmgr.vbs /ipk %productKey%
:: Activate Windows with the Microsoft servers
cscript slmgr.vbs /ato
:: Check activation status
cscript slmgr.vbs /dli
pause
🦑Cisco is Offering FREE Cyber Security Courses + official Badges!
Start Your Cybersecurity Career with these in demand courses!
⭕1. Introduction to Cybersecurity
- Course Duration: 6 HOURS
- Level: BEGINNER
- Lab: 7 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eh5MTBwT
⭕2. Cyber Threat Management
- Course Duration: 16 HOURS
- Level: INTERMEDIATE
- Lab: 16 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ehwb_Hsh
⭕3. Endpoint Security
- Course Duration: 27 HOURS
- Level: Intermediate
- Labs: 31 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eV2UB7xy
⭕4. Network Defense
- Course Duration: 27 HOURS
- Level: INTERMEDIATE
- Lab: 29 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ekTpuvyn
Source: Linkedin
Start Your Cybersecurity Career with these in demand courses!
⭕1. Introduction to Cybersecurity
- Course Duration: 6 HOURS
- Level: BEGINNER
- Lab: 7 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eh5MTBwT
⭕2. Cyber Threat Management
- Course Duration: 16 HOURS
- Level: INTERMEDIATE
- Lab: 16 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ehwb_Hsh
⭕3. Endpoint Security
- Course Duration: 27 HOURS
- Level: Intermediate
- Labs: 31 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eV2UB7xy
⭕4. Network Defense
- Course Duration: 27 HOURS
- Level: INTERMEDIATE
- Lab: 29 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ekTpuvyn
Source: Linkedin
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
🦑Reverse Engineering iOS Applications:
> Here's a streamlined approach to obtain the required tools and set up your environment for iOS reverse engineering, as described. The provided GitHub repository is an excellent resource for guidance.
### Key Tools and Instructions
1. iTunnel
- Download: Allows SSH over USB.
- Usage:
2. Cydia Impactor
- Download: Lets you sideload iOS apps using a developer certificate.
3. Hopper
- Download: Reverse engineering tool for disassembly, decompilation, and debugging.
- Trial version is sufficient.
4. Cycript
- Download: Enables runtime modification of app behavior via a console.
5. Frida
- Install:
- Purpose: Scripting to change app behavior at runtime.
6. Bettercap
- Download: Perform MITM (Man-in-the-Middle) attacks.
7. class-dump-z
- Download: Dumps ObjC classes (for ObjC apps).
8. momdec
- Download: Decompiles CoreData models.
9. Ghidra
- Download: Alternative reverse engineering tool.
---
### iOS-Specific Tools
#### iOS 10.x
- Clutch
- Use for decrypting iOS applications.
#### iOS 11.x+
- bfinject
- Extract apps using Cycript and Clutch.
- Install dependencies:
#### iOS 12.x
- frida-ios-dump
- Decrypt apps and auto-transfer to your computer.
---
### Device Setup
1. On iOS < 11.0
- Jailbreak and install via Cydia:
- Cycript
- Apple File Conduit "2"
- Frida (Source:
- Test SSH:
2. On iOS > 11.0
- Create required directories:
- Transfer and extract
3. On iOS 12.x
- Install Frida via Cydia (Source:
For more details and resources, check the GitHub repository: [RE-iOS-Apps](https://github.com/ivRodriguezCA/RE-iOS-Apps).
> Here's a streamlined approach to obtain the required tools and set up your environment for iOS reverse engineering, as described. The provided GitHub repository is an excellent resource for guidance.
### Key Tools and Instructions
1. iTunnel
- Download: Allows SSH over USB.
- Usage:
itnl --lport 2222 --iport 22
ssh -p 2222 root@localhost
2. Cydia Impactor
- Download: Lets you sideload iOS apps using a developer certificate.
3. Hopper
- Download: Reverse engineering tool for disassembly, decompilation, and debugging.
- Trial version is sufficient.
4. Cycript
- Download: Enables runtime modification of app behavior via a console.
5. Frida
- Install:
sudo pip install frida-tools
- Purpose: Scripting to change app behavior at runtime.
6. Bettercap
- Download: Perform MITM (Man-in-the-Middle) attacks.
7. class-dump-z
- Download: Dumps ObjC classes (for ObjC apps).
8. momdec
- Download: Decompiles CoreData models.
9. Ghidra
- Download: Alternative reverse engineering tool.
---
### iOS-Specific Tools
#### iOS 10.x
- Clutch
- Use for decrypting iOS applications.
#### iOS 11.x+
- bfinject
- Extract apps using Cycript and Clutch.
- Install dependencies:
sudo pip install -r requirements.txt --upgrade
#### iOS 12.x
- frida-ios-dump
- Decrypt apps and auto-transfer to your computer.
---
### Device Setup
1. On iOS < 11.0
- Jailbreak and install via Cydia:
- Cycript
- Apple File Conduit "2"
- Frida (Source:
https://build.frida.re)- Test SSH:
itnl --lport 2222 --iport 22
ssh -p 2222 root@localhost
2. On iOS > 11.0
- Create required directories:
cd / && mkdir jb
mkdir /jb/bfinject && cd /jb/bfinject
- Transfer and extract
bfinject:
scp -P 2222 ~/Downloads/bfinject.tar root@localhost:/jb/bfinject
tar xvf bfinject.tar
3. On iOS 12.x
- Install Frida via Cydia (Source:
https://build.frida.re).For more details and resources, check the GitHub repository: [RE-iOS-Apps](https://github.com/ivRodriguezCA/RE-iOS-Apps).
GitHub
GitHub - ivRodriguezCA/RE-iOS-Apps: A completely free, open source and online course about Reverse Engineering iOS Applications.
A completely free, open source and online course about Reverse Engineering iOS Applications. - ivRodriguezCA/RE-iOS-Apps
Forwarded from Exploiting Crew (Pr1vAt3)
YouTube
Ethical Hacking in 12 Hours - Full Course - Learn to Hack!
https://www.tcm.rocks/acad-y-2025 - Get 50% off your first Academy payment. Plus, take 20% off certs & live trainings!
Deals expire Dec. 1st!
Full Course: https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
All Course Resources/Links:…
Deals expire Dec. 1st!
Full Course: https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
All Course Resources/Links:…