plaxx + reverse-engineering   301

NationalSecurityAgency/ghidra: Ghidra is a software reverse engineering (SRE) framework
Ghidra is a software reverse engineering (SRE) framework - NationalSecurityAgency/ghidra
reverse-engineering  opensource  nsa 
april 2019 by plaxx
Wasabi
A framework for dynamic analysis of WebAssembly programs, developed in the Software Lab at TU Darmstadt.
javascript  webassembly  webasm  dynamic  reverse-engineering  wasm 
february 2019 by plaxx
quoscient/octopus: Security Analysis tool for WebAssembly module and Blockchain Smart Contracts (BTC/ETH/NEO/EOS)
Security Analysis tool for WebAssembly module and Blockchain Smart Contracts (BTC/ETH/NEO/EOS) - quoscient/octopus
webasm  webassembly  reverse-engineering  bitcoin  blockchain  smart-contracts  framework  btc  eth  eos 
february 2019 by plaxx
cloakware-ctf/idascripts: Some IDA Python scripts for auto-analysis and a Hive-plot visualizer.
Some IDA Python scripts for auto-analysis and a Hive-plot visualizer. - cloakware-ctf/idascripts
ida  python  ida-plugins  reverse-engineering  visualization 
february 2019 by plaxx
Analyzing PDF Exploits For Finding Payloads Used | Zscaler Blog
We have written a couple of previous blogs which focus on an in-depth analysis of PDF exploits as this is yet another techniques used by attackers to package
pdf  javascript  reverse-engineering  analysis  write-up  exploit 
february 2019 by plaxx
zxgio/gdb-cheatsheet: GDB cheatsheet for reversing binaries
GDB cheatsheet for reversing binaries. Contribute to zxgio/gdb-cheatsheet development by creating an account on GitHub.
gdb  reverse-engineering  cheatsheet 
november 2018 by plaxx
zxgio/r2-cheatsheet: Radare2 cheat-sheet
Radare2 cheat-sheet. Contribute to zxgio/r2-cheatsheet development by creating an account on GitHub.
radare  reverse-engineering  r2  cheatsheet 
november 2018 by plaxx
MobSF/Mobile-Security-Framework-MobSF: Mobile Security Framework is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static analysis, dynamic analysis, malware analysis and web API testing.
Mobile Security Framework is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static analysis, dynamic analysis, malware analysis and web API testing. - MobSF/Mobile-Security-Framework-MobSF
mobile  infosec  pentesting  reverse-engineering  code-review  android  ios  security  mitm  debug  static-analysis  dynamic  automation 
october 2018 by plaxx
sensepost/objection: 📱 objection - runtime mobile exploration
📱 objection - runtime mobile exploration. Contribute to sensepost/objection development by creating an account on GitHub.
mobile  infosec  pentesting  reverse-engineering  code-review  android  ios  Security  mitm  debug 
october 2018 by plaxx
Compiler Explorer
see the output of compilers in assembly
assembly  compiler  c++  c  reverse-engineering  asm  rust  go  d  haskell  swift  pascal 
june 2018 by plaxx
DynamoRIO Dynamic Instrumentation Tool Platform
DynamoRIO is a runtime code manipulation system that supports code transformations on any part of a program, while it executes. DynamoRIO exports an interface for building dynamic tools for a wide variety of uses: program analysis and understanding, profiling, instrumentation, optimization, translation, etc. Unlike many dynamic tool systems, DynamoRIO is not limited to insertion of callouts/trampolines and allows arbitrary modifications to application instructions via a powerful IA-32/AMD64/ARM/AArch64 instruction manipulation library. DynamoRIO provides efficient, transparent, and comprehensive manipulation of unmodified applications running on stock operating systems (Windows, Linux, or Android) and commodity IA-32, AMD64, ARM, and AArch64 hardware.
dynamic  compiler  reverse-engineering  instrumentation  arm  x86  x86_64  android  windows  linux 
may 2018 by plaxx
pd: process dump
Process Dump is a Windows reverse-engineering tool to dump malware memory components back to disk for analysis. It uses an aggressive import reconstruction approach to make analysis easier, and supports 32 and 64 bit modules. Dumping of regions without PE headers is supported and in these cases PE headers and import tables will automatically be generated.
windows  process  dump  reverse-engineering  pe  mz  import  x64  x86 
february 2018 by plaxx
Cycript
Cycript allows developers to explore and modify running applications on either iOS or Mac OS X using a hybrid of Objective-C++ and JavaScript syntax through an interactive console that features syntax highlighting and tab completion.
(It also runs standalone on Android and Linux and provides access to Java, but without injection.)
iphone  android  mobile  dynamic  debugging  analysis  reverse-engineering  ios  objective-c  javascript 
january 2018 by plaxx
vivisect/vivisect
Fairly un-documented static analysis / emulation / symbolik analysis framework for PE/Elf/Mach-O/Blob binary formats on various architectures.
binary  analysis  reverse-engineering  python  security  exploit  research 
october 2017 by plaxx
Compiler Explorer
Amazing aid to reverse engineer c / c++ source code
c++  compiler  assembly  asm  gcc  mips  arm  c  reverse-engineering 
august 2017 by plaxx
decalage2/oletools: oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
olefile  maldoc  malware  vba  office  powerpoint  word  Fileformat  microsoft  ole  reverse-engineering 
may 2017 by plaxx
decalage2/olefile: olefile is a Python package to parse, read and write Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office 97-2003 documents, vbaProject.bin in MS O
olefile is a Python package to parse, read and write Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office 97-2003 documents, vbaProject.bin in MS Office 2007+ files, Image Composer and FlashPix files, Outlook messages, StickyNotes, several Microscopy file fo…
olefile  maldoc  malware  vba  office  powerpoint  word  Fileformat  microsoft  ole  reverse-engineering 
may 2017 by plaxx
« earlier      
per page:    204080120160

related tags

010Editor  abandonware  academic  actionscript  aes  amplification  analysis  analyzer  android  angr  anti  anti-analysis  anti-anti-debug  anti-debug  anti-debugging  anti-decompiler  anti-sandbox  anti-vm  antivirus  api  apk  app  apple  ar  architecture  archive  arm  article  asm  assembly  ast  audit  authoring  automation  B::Deparse  backup  badusb  baksmali  bank  barcode  baud  beautifier  binary  binnavi  binwalk  bitcoin  blackhat  blockchain  blog  book  bootloader  bootstrap  botnet  breakpoint  broadcast  btc  buffer-overflow  builder  bypass  bytecode  c  c#  c++  cable  capstone  cars  certificate  challenge  challenges  charset  cheatsheet  cheminot  class  classification  cli  clock  clr  code  code-review  collaboration  collection  commercial  community  company  compiler  compression  conference  config  configuration  contest  course  cpu  cracking  crackme  crypto  cryptography  ctf  cuckoo  d  dalvik  data  database  db  dbi  DDoS  debian  debug  debugger  debugging  decompilation  decompiler  defcon  delphi  demo  deobfuscation  detection  devel  development  dex  diesel  diff  disassembler  dissassembler  dlink  dll  dmp  dns  doc  docker  docsys  documentation  dot-net  dotnet  dotpeek  drama  drivers  drm  dsl  dump  dumpit  dvb  dynamic  eclipse  editor  edr  efi  electronics  elf  embedded  emulation  emulator  encoding  engineering  entropy  eos  eset  eth  ETS  evasion  event  excel  exe  executable  execution  exercise  exploit  exploitation  extension  extract  fileformat  filesystem  fireeye  firmware  flare  flash  forensic  forensics  fork  format  formatter  fpga  framework  france  free  fuzzer  fuzzing  games  gcc  gdb  getnetguid  github  gnutls  go  go-lang  grammar  graph  grsecurity  gui  hacking  hands-on  hardware  hash  haskell  helper  hex  hex-editor  hooking  how-to  howto  hp  hypervisor  iat  ida  ida-plugins  ida_ipython  idb  ide  identification  il  ildasm  ilspy  image  images  import  incidence-response  industry  infosec  injection  innosetup  installer  instructions  instrumentation  int  ios  iot  iphone  ipython  ir  isp  jar  java  java5  javascript  jeb  js  juniper  kernel  keyboard  law  legacy  library  linker  linux  linux.conf.au  logs  low-level  machine-learning  macho  macos  macro  macros  maldoc  malware  manifest  manufacturing  matplotlib  memory  microsoft  minimal  mips  mitm  mobile  modify  montreal  mov  mpeg  msdn  multi-platform  mz  nes  netgear  netscreen  network  news  nintendo  nrf24  nsa  nsis  ntp  nvram  obfuscation  object-oriented  objective-c  ocaml  office  offset  ole  olefile  ollvm  ollydbg  online  opensource  osx  p3da  packer  packers  panda  paper  papers  parser  parsing  pascal  patch  pax  pcap  pcb  pdf  pe  peda  pemu  pentest  pentesting  performance  perl  perlcc  phrack  pickle  pinning  platform-independant  plugin  poc  pointers  pollution  port  posix  powerpoint  ppt  practice  presentation  prettify  pretty  printer  process  programming  proprietary  protection  protobuf  protocol  puzzle  puzzles  pyinstaller  pykd  python  python3  qemu  qt  qtconsole  quebec  r2  radare  rate  rce  realbasic  recon  reference  reflection  reflector  regex  registry  research  resource  resources  restaurant  reverse  reverse-engineering  rewrite  rf  ring3  rom  router  rtti  ruby  rust  rvmi  sandbox  satellite  scanner  schema  screenos  script  scripting  sd-card  sections  security  serial  serialization  shared  sharing  shell  shellcode  side-channel  simulator  skimmer  skype  slides  smali  smalivm  smart-contracts  smartcard  smt  snes  sniffer  software  solver  spoof  sql  squashfs  ssl  stack  state-machine  static  static-analysis  stream  string  strings  strip  survey  swf  swift  symbolic  symbols  syn  synchronization  synchronize  talk  tax  team  technique  television  templates  tidy  tls  tool  tools  tracing  training  trial  TS  tutorial  uefi  unicorn  unix  unpack  unpacker  unpacking  usb  usermode  utf-8  utf-16  vb  vba  vc++  video  viewer  virtual  virtualization  virtualized  visual-basic  visual-studio  visualization  vm  vmi  vmprotect  volatility  Volkswagen  vulnerability  vulnerability-research  wasm  web  web-based  webasm  webassembly  wifi  win32  windbg  windows  wired  wireless  word  workshop  wps  write-up  x64  x64dbg  x86  x86_64  xls  xml  xojo  z3  zyxel 

Copy this bookmark:



description:


tags: