How to use Ghidra to Reverse Engineer Mobile Application
https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa
@reverseengine
https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa
@reverseengine
Medium
How to use Ghidra to Reverse Engineer Mobile Application
Unveil the
❤1
IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature
https://www.youtube.com/watch?v=plaRysF1cxk
@reverseengine
https://www.youtube.com/watch?v=plaRysF1cxk
@reverseengine
YouTube
IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature
IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature by Hexorcist
In this video, we are going to see that we can get decrypted code very fast in our IDB without bothering to write IDA Python noscripts. In those examples, I am using simple XOR, but…
In this video, we are going to see that we can get decrypted code very fast in our IDB without bothering to write IDA Python noscripts. In those examples, I am using simple XOR, but…
❤1
MASM32 Code collection for reverse engineers
https://github.com/Xyl2k/Xylitol-MASM32-snippets
@reverseengine
https://github.com/Xyl2k/Xylitol-MASM32-snippets
@reverseengine
GitHub
GitHub - Xyl2k/Xylitol-MASM32-snippets: MASM32 Code collection for reverse engineers
MASM32 Code collection for reverse engineers. Contribute to Xyl2k/Xylitol-MASM32-snippets development by creating an account on GitHub.
❤1
A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures
https://github.com/mytechnotalent/Reverse-Engineering-Tutorial
@reverseengine
https://github.com/mytechnotalent/Reverse-Engineering-Tutorial
@reverseengine
GitHub
GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit…
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures. - mytechnotalent/Reverse-Engineering
❤1
Forwarded from Source Byte
K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation
https://blog.quarkslab.com/k7-antivirus-named-pipe-abuse-registry-manipulation-and-privilege-escalation.html
#CVE-2024-36424
https://blog.quarkslab.com/k7-antivirus-named-pipe-abuse-registry-manipulation-and-privilege-escalation.html
#CVE-2024-36424
❤1
Project Zero: An iOS hacker tries Android
https://googleprojectzero.blogspot.com/2020/12/an-ios-hacker-tries-android.html
@reverseengine
https://googleprojectzero.blogspot.com/2020/12/an-ios-hacker-tries-android.html
@reverseengine
Blogspot
An iOS hacker tries Android
Written by Brandon Azad, when working at Project Zero One of the amazing aspects of working at Project Zero is having the flexibility to dir...
❤1
This is for the Pwners: Exploiting a WebKit 0-day in PlayStation 4
https://www.synacktiv.com/publications/this-is-for-the-pwners-exploiting-a-webkit-0-day-in-playstation-4.html
@reverseengine
https://www.synacktiv.com/publications/this-is-for-the-pwners-exploiting-a-webkit-0-day-in-playstation-4.html
@reverseengine
Synacktiv
This is for the Pwners: Exploiting a WebKit 0-day in PlayStation 4
❤1
A Full-Featured HexEditor compatible with Linux/Windows/MacOS
https://github.com/echo-devim/fhex
@reverseengine
https://github.com/echo-devim/fhex
@reverseengine
GitHub
GitHub - echo-devim/fhex: A Full-Featured HexEditor compatible with Linux/Windows/MacOS
A Full-Featured HexEditor compatible with Linux/Windows/MacOS - echo-devim/fhex
❤1
Ghidra framework for iOS kernelcache reverse engineering
https://github.com/0x36/ghidra_kernelcache
@reverseengine
https://github.com/0x36/ghidra_kernelcache
@reverseengine
GitHub
GitHub - 0x36/ghidra_kernelcache: a Ghidra framework for iOS kernelcache reverse engineering
a Ghidra framework for iOS kernelcache reverse engineering - 0x36/ghidra_kernelcache
❤1
Linux Kernel Adventures: Reversing and Exploiting a Linux Driver
https://media.handmade-seattle.com/linux-kernel-adventures
@reverseengine
https://media.handmade-seattle.com/linux-kernel-adventures
@reverseengine
❤1
Hexagon processor module for IDA Pro disassembler
https://github.com/n-o-o-n/idp_hexagon
@reverseengine
https://github.com/n-o-o-n/idp_hexagon
@reverseengine
GitHub
GitHub - n-o-o-n/idp_hexagon: Hexagon processor module for IDA Pro disassembler
Hexagon processor module for IDA Pro disassembler. Contribute to n-o-o-n/idp_hexagon development by creating an account on GitHub.
❤1
❤1
❤1😭1
APIMiner - The API Logger for Malwares - The Fast Way To Identifying Malwares
http://www.malware-analysis-and-detection-engineering.com/2020/09/apiminer-api-logger-for-malwares-fast.html
@reverseengine
http://www.malware-analysis-and-detection-engineering.com/2020/09/apiminer-api-logger-for-malwares-fast.html
@reverseengine
Malware-Analysis-And-Detection-Engineering
APIMiner - The API Logger for Malwares - The Fast Way To Identifying Malwares
Direct Download Link for Latest Release of APIMiner: https://github.com/poona/APIMiner/releases/download/1.0.0/release-v1.0.0.zip One of...
❤1
این بخش داخل ریورس بدافزار آنپکینگ تحلیل فانکشن های ++C و Lib ها استفاده میشه
Struct داخل struct
مثال C:
داخل حافظه اینجوری دیده میشه:
در اسمبلی:
نکته
اگر دیدید چند فیلد int پشتسر همن تقریبا همیشه یک struct است نه آرایه
اگر یک offset یهو زیاد شد مثل 16 یعنی وجود double / pointer / align
This section is used in reverse malware unpacking analysis of C++ functions and Libs
Struct inside struct
Example C:
In memory it looks like this:
In assembly:
Tip
If you see multiple int fields in a row, it's almost always a struct, not an array
If an offset suddenly increases, like 16, it means there's a double / pointer / align
@reverseengine
Struct داخل struct
مثال C:
struct B {
int x;
int y;
};
struct A {
int id;
struct B pos;
double score;
};
داخل حافظه اینجوری دیده میشه:
offset 0 id (int)
offset 4 pos.x (int)
offset 8
pos.y (int)
offset 12 padding
(برای align کردن double)
offset 16 score (double)
در اسمبلی:
mov eax, DWORD PTR [rdi] ; id
mov eax, DWORD PTR [rdi + 4] ; pos.x
mov eax, DWORD PTR [rdi + 8] ; pos.y
movsd xmm0, [rdi + 16] ; score
نکته
اگر دیدید چند فیلد int پشتسر همن تقریبا همیشه یک struct است نه آرایه
اگر یک offset یهو زیاد شد مثل 16 یعنی وجود double / pointer / align
This section is used in reverse malware unpacking analysis of C++ functions and Libs
Struct inside struct
Example C:
struct B {
int x;
int y;
};
struct A {
int id;
struct B pos;
double score;
};
In memory it looks like this:
offset 0 id (int)
offset 4 pos.x (int)
offset 8
pos.y (int)
offset 12 padding
(to align double)
offset 16 score (double)
In assembly:
mov eax, DWORD PTR [rdi] ; id
mov eax, DWORD PTR [rdi + 4] ; pos.x
mov eax, DWORD PTR [rdi + 8] ; pos.y
movsd xmm0, [rdi + 16] ; score
Tip
If you see multiple int fields in a row, it's almost always a struct, not an array
If an offset suddenly increases, like 16, it means there's a double / pointer / align
@reverseengine
❤1