Program-transformation.org is dedicated to collecting, organizing and disseminating information about all aspects of program transformation in order to share results across communities.
http://www.program-transformation.org/
http://www.program-transformation.org/
pe_unmapper
convert beteween the PE alignments (raw and virtual).
https://github.com/hasherezade/libpeconv/tree/master/pe_unmapper
convert beteween the PE alignments (raw and virtual).
https://github.com/hasherezade/libpeconv/tree/master/pe_unmapper
GitHub
libpeconv/pe_unmapper at master · hasherezade/libpeconv
A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl - hasherezade/libpeconv
Should we create a general reverse engineering community on Telegram to share resources and discuss related topics?
Anonymous Poll
95%
1
5%
0
The official community group is up 🥳🥳🎉
Please read and remember to stick to the rules. Make it a valuable place for learning and sharing knowledge with each other. If anything is unclear, please ask for clarification. After that.
[[ Rules ]]
- The sole language in the chat is English. Messages in any other language will be removed and a warning will be issued.
- Off-topic messages will be removed without warning. This is not a technical support channel.
- Although this is already covered in the "no off-topic" rule, the high amount of offenders caused this to be a specific rule: asking for help after a ransomware infection or for cracking a software is off-topic and thus not permitted.
- Be civil, clear and concise when asking a question. No one in this chat is obliged to answer your question. Help is given on a voluntary basis, and cannot be demanded as such. Depending on the severity of the offense, a warning will be given. After a few warnings, you will be removed from the group on a permanent basis.
- Copyrighted material which is not to be distributed, is not to be distributed in this channel. Any form of illegal content sharing is strictly forbidden. Breaking this rule results in a permanent ban.
- Any illegal activity is forbidden, causing you to be permanently removed from the group without warning.
Enjoy!
@reverseengineeringz
Please read and remember to stick to the rules. Make it a valuable place for learning and sharing knowledge with each other. If anything is unclear, please ask for clarification. After that.
[[ Rules ]]
- The sole language in the chat is English. Messages in any other language will be removed and a warning will be issued.
- Off-topic messages will be removed without warning. This is not a technical support channel.
- Although this is already covered in the "no off-topic" rule, the high amount of offenders caused this to be a specific rule: asking for help after a ransomware infection or for cracking a software is off-topic and thus not permitted.
- Be civil, clear and concise when asking a question. No one in this chat is obliged to answer your question. Help is given on a voluntary basis, and cannot be demanded as such. Depending on the severity of the offense, a warning will be given. After a few warnings, you will be removed from the group on a permanent basis.
- Copyrighted material which is not to be distributed, is not to be distributed in this channel. Any form of illegal content sharing is strictly forbidden. Breaking this rule results in a permanent ban.
- Any illegal activity is forbidden, causing you to be permanently removed from the group without warning.
Enjoy!
@reverseengineeringz
Reverse Engineering pinned «The official community group is up 🥳🥳🎉 Please read and remember to stick to the rules. Make it a valuable place for learning and sharing knowledge with each other. If anything is unclear, please ask for clarification. After that. [[ Rules ]] - The sole…»
A list of Reverse Engineering articles, books, and papers
https://github.com/onethawt/reverseengineering-reading-list
https://github.com/onethawt/reverseengineering-reading-list
GitHub
GitHub - onethawt/reverseengineering-reading-list: A list of Reverse Engineering articles, books, and papers
A list of Reverse Engineering articles, books, and papers - onethawt/reverseengineering-reading-list
Anti-virus Artifacts II is out!
https://github.com/D3VI5H4/Antivirus-Artifacts/blob/main/AntivirusArtifacts2.pdf
https://github.com/D3VI5H4/Antivirus-Artifacts/blob/main/AntivirusArtifacts2.pdf
GitHub
Antivirus-Artifacts/AntivirusArtifacts2.pdf at main · ethereal-vx/Antivirus-Artifacts
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot. - ethereal-vx/Antivirus-Artifacts
A quality write-up by hasherezade about challenge 9 of FlareOn7: https://hshrzd.wordpress.com/2020/12/12/flareon-7-task-9/
hasherezade's 1001 nights
Flare-On 7 – Task 9
This year’s FlareOn was very interesting. I managed to finish it with 87th place. In this small series I will describe my favorite tasks, and how I solved them. I hope to provide some educati…
Malwoverview is a first response tool used for downloading and screening malware samples, suspicious URLs, IP address, domains. Malwoverview offers threat hunting information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Valhalla and it is able to scan Android devices against VT and HA.
https://github.com/alexandreborges/malwoverview
https://github.com/alexandreborges/malwoverview
GitHub
GitHub - alexandreborges/malwoverview: Malwoverview is a first response tool used for threat hunting and offers intel information…
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th...
Automating binary vulnerability discovery with Ghidra and Semgrep
https://security.humanativaspa.it/automating-binary-vulnerability-discovery-with-ghidra-and-semgrep/
https://security.humanativaspa.it/automating-binary-vulnerability-discovery-with-ghidra-and-semgrep/
HN Security
Automating binary vulnerability discovery with Ghidra and Semgrep - HN Security
Introducing new binary vulnerability research tools and methodology, based on custom Ghidra plugins and Semgrep.
Reverse Engineering/Game Patching Tutorial: Full Res Roller Coaster Tycoon with Ghidra+x64dbg+Python
https://www.youtube.com/watch?v=cwBoUuy4nGc&t=13s&ab_channel=jeFF0Falltrades
https://www.youtube.com/watch?v=cwBoUuy4nGc&t=13s&ab_channel=jeFF0Falltrades
This is a collection of tools you may like if you are interested in reverse engineering and/or malware analysis on x86 and x64 Windows systems.
https://github.com/mentebinaria/retoolkit
https://github.com/mentebinaria/retoolkit
GitHub
GitHub - mentebinaria/retoolkit: Reverse Engineer's Toolkit
Reverse Engineer's Toolkit. Contribute to mentebinaria/retoolkit development by creating an account on GitHub.