reversing   1368

« earlier    

Update: pdf-parser.py Version 0.7.0 | Didier Stevens
<code class="language-bash">
./pdf-parser.py -n document.pdf
./pdf-parser.py -s objstm document.pdf

# decode stream objects ('-f' = filter)
./pdf-parser.py -s objstm -f document.pdf

# force 'pdfid.py' to parse the output of above (even though it's
# missing a proper PDF header)
./pdf-parser.py -s objstm -f document.pdf | ./pdfid.py -n -f

# which is (I think?) is roughly the same as
./pdf-parser.py -a -O document.pdf
</code>
pdf  parser  reversing  reverseengineering  forensic  malware  analysis  commandline  python  video  streamobject  solution 
17 days ago by kme
Decompress FlateDecode Objects in PDF
Tips on how to get working in Python 3 here: https://stackoverflow.com/a/53609642/785213

<code class="language-python">import re
import zlib

pdf = open("some_doc.pdf", "rb").read()
stream = re.compile(r'.*?FlateDecode.*?stream(.*?)endstream', re.S)

for s in stream.findall(pdf):
s = s.strip('\r\n')
try:
print(zlib.decompress(s))
print("")
except:
pass</code>
python  pdf  reversing  forensics  objectstream  flatedecode  zlib 
17 days ago by kme
Cisco-Talos/pyrebox
PyREBox is a Python scriptable Reverse Engineering sandbox. It is based on QEMU, and its goal is to aid reverse engineering by providing dynamic analysis and debugging capabilities from a different perspective. PyREBox allows to inspect a running QEMU VM, modify its memory or registers, and to instrument its execution, by creating simple scripts in python to automate any kind of analysis. QEMU (when working as a whole-system-emulator) emulates a complete system (CPU, memory, devices...). By using VMI techniques, it does not require to perform any modification into the guest operating system, as it transparently retrieves information from its memory at run-time.
tool  commandline  security  malware  python  reversing 
18 days ago by jonseager
ReversingHero - Learn Reverse Engineering
What is Reverse Engineering?

Reverse Engineering is the process of taking something and trying to figure out how it works from the inside.

Reverse Engineering a computer program is done by reading the low level machine code it is made of, and understanding how it works internally.
Why learn Reverse Engineering?

You are curious about how things really work.
Reverse Engineering is a fundamental technological skill. If you can understand how computer programs work, you can do anything.
Reverse Engineering is an important skill for any security researcher or pentester.
Become a better developer by understanding how the programs you write work from the inside.

About ReversingHero

ReversingHero is a 15-challenges computer program, designed to teach you Reverse Engineering. It begins from the real basics, and continues into more advanced topics.

To move on to next challenge, you have the solve the previous one. This makes sure that you progress gradually, and reach a challenge only when you are ready to solve it.
security  training  hacking  reversing 
18 days ago by jonseager
Reverse Engineering the Amazon Dash Wand: Part 1 - First Steps
> My IOT capture setup involves a Raspberry Pi 3 that is configured as a wireless access point using hostapd. On the Pi, I run tcpdump to capture traffic and mitmproxy to attack SSL connections.
reversing 
21 days ago by natevw

« earlier    

related tags

'no  "reverse  afl  aging  allocation  analysis  android  api-hooking  apk  app  archive  arm  aslr  asm  assembly  at  auta  binary  blogs  c++  c  cars  celtic  checksum  china  commandline  compilers  conference  crc  cryptanalysis  cryptography  cycript  dave  death:  debugger  debugging  decompiler  dedicated  desemsamblador  disasembler  disassembler  diy  dos  editor  electronics  encryption  engineering"  engineering  exploit  exploiting  exploits  facebook  fact  firmware  flatedecode  forensic  forensics  frida  fsharp  funny  fuzzing  game  gdb  ghidra  github  go  golang  guide  hack  hacking  handy-tools  hardware  have  hex  hooking  howto  human  ibrox  ida  idapro  infosec  inside  intention'  interesting  internals  ios  ios11  ios12  ipa  jailbreak  king:  lcg  led  linux  low-level  malware  math  maybesolution  mobile  nfc  nonfree  obfuscation  objc  objectstream  of  offroading  opensource  parser  pdf  prng  prngs  programming  python  r2  randomness  rangers  re  research  reverse-engineering-tools  reverse-engineering  reverse  reverseengineering  revwrseengineering  rpg  samochody  security  solution  speed  streamobject  suzuki  swift  systems  the  ticket  to  tool  tools  topgear  training  tutorial  uart  unicorn  video  vulnerability  web  windows  wynajem  x86  zlib  “curing” 

Copy this bookmark:



description:


tags: