dza + reverse-engineering   151
Disassemble hex edit bytes directly in the browser
asm  assembly  disassemble  disassembler  web  hex  reverse-engineering 
june 2016 by dza
Reverse Engineering — Make OTX works in OS X Mavericks with Xcode 5
# wrong: It's like this.
sudo ln -s /Applications/ /Applications/

otx  mavericks  howto  tutorial  guide  xcode  debugging  asm  assembly  reverse-engineering  reverse  engineering 
december 2013 by dza
0xd4d / de4dot — Bitbucket
Supposedly the only one that can't be deobfuscated by common tools.
reverse-engineering  obfuscation  decompile  decompiler  CLR  csharp  net  windows  dotnet 
october 2013 by dza
Confuser - Home
C# code obfuscation, encryption, packing ...

Seems to be THE tool for the job.
confuser  csharp  reverse-engineering  reverse  obfuscator  pack  packer  cil  dbugger  decompiler  decompilation  encrypt  encryption  security  dev 
april 2013 by dza
Software archaeology
asmDIFF | An x86 binary assembler search tool

asmDiff is an binary assembly search, diff and disassembly tool. It supports Windows PE (exe/dll) and Linux ELF binary format compiled for x86 and x68_64 architectures. It is particular useful when searching for asm functions, instructions or memory pointers in a patched, updated or otherwise modified binary. Try out the live demo and read the paper below.

Note: asmDIFF is still closed source as long as we do not know how to proceed with it. Feel free to contact us on questions, suggestions, or licensing request. However a fully useable win32 version is included in mmBBQ 3.0.0 and upwards.

Quick start:

upload two binaries files. (exe/dll/elf)
$> asmdiff search <ADDR> -o <OLDFILE> -n <NEWFILE>
$> asmdiff diff -o /usr/bin/asmdiff -n /usr/bin/asmdiff
assembly  reverse-engineering  reverse  security  diff  instruction  instructions  asm 
march 2013 by dza
Blizzhackers • Index page
One of the most epic Reverse-Engineering gaming sites on the internet :) for one of the most secure online platforms, powered by one of the most feared ban-hammers (Warden).
game  gaming  reverse-engineering  reverse  howto  tutorial  guide  warcraft  starcraft  world  of  1  2  3  wc3  sc2  sc  wc  wow  warden  hook  hooks  d3  diablo  blizzard 
march 2013 by dza
OpenRCE (OpenRCE)

A pure-python fully automated and unattended fuzzing framework.

Last updated 5 months ago



A reverse engineering framework written in Python.

Last updated a year ago



A pure-python win32 debugger interface.

Last updated a year ago
openrce  reverse-engineering  reverse  pydbg  sulley  paimei  github 
march 2013 by dza
wxHexEditor - a Free Hex Editor / Disk Editor for Huge Files or Devices on Linux, Windows and MacOSX
Looks like a decent free Hex editor with interesting features such as:
* Disassembly instructions
* Conversion
* and more!

From the creator of the custom SAMSUNG TV firmware SamyGo
hex  edit  editor  win  linux  mac  macosx  win32  disassembly  reverse-engineering  reverse  software  windows 
march 2013 by dza
Bios Mods -The Best BIOS Update and Modification Source
* CPU Support Upgrades
* Unlocking of OC, and hidden menus
* HDD limit Upgrades
* Wifi/WWAN Replacement, Whitelist (mini PCI-e replacement)
Be sure to check the forum!
bios  mods  ami  award  phoenix  AFUDOS  PHLASH  insyde  wlan  wifi  howto  tutorials  guide  reverse-engineering  reverse 
march 2013 by dza - BinDiff
Comparing two executables to learn from already cracked programs in a graphed assembly output for education, GREAT!
asm  reverse-engineering  reverse  compare  difference  diff  comparing  crack  cracking  binary 
march 2013 by dza
Reverse Engineering 1 - YouTube
Basic understanding of Reverse-Engineering and ASM instructions. Great examples, great voice, long, thorough.
reverse-engineering  beginner  asm  assembly  reverse  basic 
february 2013 by dza
winapiexec - RaMMicHaeL's home page
Run Win32 API functions directly from the command-line.

Pretty handy for reversing huh?
win32  winapi  windows  api  exec  reverse-engineering  reverse 
february 2013 by dza
PeStudio helps you to discover many security relevant details about any application and library without starting them, like:

whether Applications are embedded in an application
whether Registry files are embedded in an application
whether PDF files are embedded in an application
whether CAB files are embedded in an application
whether Anonymous functions are exported
whether Obsolete functions are imported
whether Data Execution Prevention (DEP) will be used
whether Address Space Layout Randomization (ASLR) is used
whether Structured Exception Handling (SEH) is used
whether Unused bytes (Caves) are available
whether Structured Storage is used
whether The file is obfuscated (encrypted, compressed)
and many more details...
pestudio  reverse-engineering  reverse  tool  tools  download 
february 2013 by dza
Linux system debugging super tutorial
Debugging with GDB, strace, ltrace and lsof on slow processes ...
howto  tutorial  guide  dev  lsof  linux  strace  ltrace  profile  profiling  reverse  reverse-engineering 
december 2012 by dza
How main() is executed on Linux LG #84

The question is simple: how does linux execute my main()?
Through this document, I'll use the following simple C program to illustrate how it works. It's called "simple.c"



gcc -o simple simple.c

What's in the executable?

To see what's in the executable, let's use a tool "objdump"

objdump -f simple

simple: file format elf32-i386
architecture: i386, flags 0x00000112:
start address 0x080482d0

The output gives us some critical information about the executable.
First of all, the file is "ELF32" format. Second of all, the start address is "0x080482d0"
asm  assembly  reverse-engineering  reverse  linux  objdump  gcc  howto  tutorial  guide  dev 
september 2012 by dza
Tavis Ormandy - Executable Patching with GDB
Some really professional advice, from an Opera dev- I stumbled upon this guy searching for some Opera advice at another time :)

He looks very talented and writes a good article.
gdb  reverse  reverse-engineering  patch  patching  debug  debugging  assembly  asm  nasm_assemble  gdbinit  assemble 
may 2012 by dza
Binary File Descriptor library - Wikipedia, the free encyclopedia
The Binary File Descriptor library (BFD) is the GNU Project's main mechanism for the portable manipulation of object files in a variety of formats. As of 2003, it supports approximately 50 file formats for some 25 processor architectures.
bfd  binary  file  descriptor  library  gdb  reverse  reverse-engineering  assembly  asm 
may 2012 by dza
Beej's Quick Guide to GDB
Compiling to use a debugger
More Information
Starting gdb and getting to main()
Stepping Around
Examining Variables
Misc Stuff
Stack Manipulation
Additional Stepping Methods
Jumping to an Arbitrary Section of Code
Changing Variables and Values at Runtime
Hardware Watchpoints
Attach to a Running Process
Using Coredumps for Postmortem Analysis
Window Functions
Display Registers and Assembly
Writing a Front-End
Quick Reference Cheat Sheet
gdb  break  breakpoint  breakpoints  step  stepping  debug  debugging  asm  assembly  reverse  reverse-engineering  coredump  coredumps  stack  stacks  variable  variables  values  watch  watchpoints  attach  window  function  functions  register  registers  cheatsheet  cheatsheets 
may 2012 by dza
dirtyJOE - Java Overall Editor - Homepage of binary java class file editor
Java Overall Editor

For Reverse-Engineering java .class files ..
reverse  reverse-engineering  dirtyjoe  class  java  dev  python 
april 2012 by dza
« earlier      
per page:    204080120160

related tags

!gdb  0xed  16-bit  76service  a  activex  AFUDOS  american  ami  analysis  analyze  analyzing  android  anti-debug  anti-debugging  api  apihooks  apk  apple  aquaticprime  archived  ARM  as  ascii  ASLR  asm  asm.js  assemble  assembler  assembly  attach  attaching  avd  award  backdoor  basic  beginner  bfd  biew  binary  bios  bitcoin  blizzard  blog  book  books  boot  booting  bpx  break  breakpoint  breakpoints  bsd  buffer  c  c++  c-dilla  call  calls  carding  cc  cd-key  cdilla  cdkey  chat  chatting  cheat  cheatsheet  cheatsheets  checksum  cil  class  CLR  cocoa  code  command  commander  compare  comparing  compiler  compilers  compressor  compressors  confuser  connscan  connscan2  control  coredump  coredumps  CoreFoundation  CoreGraphics  cpp  crack  cracker  cracking  crackme  crackmes  cracks  crash  crc  creditcard  csharp  d3  d3d  d3d8  dalvik  date  datetime  dbg  dbugger  dead  death  debian  debug  debugger  debuggers  debugging  decompilation  decompile  decompiler  defcon  DEP  descriptor  dev  device  diablo  diablo3  diff  difference  directx  directx8  dirtyjoe  disassemble  disassembler  disassemblers  disassembling  disassembly  dotnet  download  download.this  dump  dumping  dx8  dynamic  ebook  edb  edge  edit  editor  editors  eflags  elf  emu  emulator  encrypt  encryption  engineering  escalation  escape  evan's  evans  evic  examiner  exe  exec  exploit  exploiting  exploits  extension  extensions  file  file-analyzer  file-analyzers  fileformat  filetype  FindWindow  firewall  firewalls  firmware  fishme  flag  foff  font  format  formats  forum  Foundation  french  fs_usage  function  functions  fuzzer  fuzzing  fuzzy  game  games  gaming  gcc  gdb  gdbinit  GDT  gendump  getlocaltime  getsystemtime  getsystemtimeasfiletime  GetTitleBarInfo  GetWindowPosition  github  google  Gozi  graf  guide  hack  hacker  hacking  HARES  hash  header  headers  heap  help  hex  hivelist  hoff  hook  hooks  hover  HoverControl  howto  humor  ia-32  ia32  iii  immunity  impacket  inject  instruction  instructions  insyde  INt3  intel  interesting  IntPtr  java  javascript  jmp  jne  js  kartograph  kernel  kext  key  keygen  keygenme  keygenmes  keygenning  keygens  keylog  keylogger  krobar  LDT  library  link  links  linux  lipo  lldb  lm  loader  lsof  ltrace  maas  mac  machine  macosx  malfind  malware  man  maphack  market  mavericks  megatrends  memdump  memory  microsoft  mode  mods  moonsols  nasm_assemble  native  net  network  networking  newbie  news  ninja  nm  nop  ntfs  ntlm  obfuscation  obfuscator  obj-c  objc  objdump  objective-c  of  olly  ollydbg  onlinehashcrack  opcode  opcodes  openrce  opensourcedays  ophcrack  os  osd  osd13  osx  other  others  otool  otx  overflow  overflows  pack  packer  paimei  patch  patcher  patchers  patching  pbx  pcapy  pdf  peid  perl  pestudio  PHLASH  phoenix  php  pinvoke  play  Prinimalka  privilege  profile  profiling  programming  protected  protection  protections  protector  protectors  pslist  PT_DENY_ATTACH  public  pwdump  pydbg  python  qt  quickstart  radare  RAM  rar  RC4  rce  re  readelf  real  RED  reddit  reference  register  registers  registration  reverse  reverse-engineering  reverseenginerring  reversing  ROP  russian  rx200  safedisc  sam  samsung  sc  sc2  security  segment  segments  SEH  SEHOP  serial  serials  service  SetControl  SetWindowLong  SetWindowLongPtr  SetWinEventHook  shadowcrew  shellcode  skullsecurity  smarttv  smashing  SnD  snowman  softice  software  stack  stacks  starcraft  steganography  step  stepping  stick  strace  sudo  sulley  supreme  symbol  symbols  syscall  syscalls  system  table  TDL  test  themida  time  timewaste  TLB  TLB-splitting  tool  toolkit  tools  tracer  trainer  trial  tsbx  tutorial  tutorials  tv  type  uefi  unicode  unix  unpacker  unpackers  unreal  usb  user  values  variable  variables  video  virtual  virus  vm  vmmap  vol  volshell  w32dasm  warcraft  warden  wargame  wargames  watch  watchpoints  wc  wc3  wdbg  web  wifi  wikibooks  win  win32  win32api  win32dd  winapi  window  windows  WinEventHook  WinEventProc  winpcap  wireless  wishlist  wlan  world  wow  WPM  x  x86  xbox  xcode  zero  zeroflag  zf 

Copy this bookmark: