Reverse Engineering – Telegram
Reverse Engineering
4.75K subscribers
106 photos
1 video
18 files
458 links
Everything is open-source.

The official community group: @reverseengineeringz
Download Telegram
Radare2 installer for windows

https://radare.mikelloc.com/get/3.2.1/radare2_installer-msvc_32-3.2.1.exe
https://radare.mikelloc.com/get/3.2.1/radare2_installer-msvc_64-3.2.1.exe

Radare can be found too inside Cutter installation directory in windows
Screenshot at 2019-01-24 11-14-21.png
113.9 KB
R2 commands
agc
aga
agx
pdd
axt @@ str.*
Practical Malware Analysis Sam Class Course
amber a reflective PE packer for bypassing security products and mitigations
https://github.com/EgeBalci/Amber
A reverse shell is a shell initiated from the target host back to the attack box which is in a listening state to pick up the shell. A bind shell is setup on the target host and binds to a specific port to listens for an incoming connection from the attack box. In malicious software a bind shell is often revered to as a backdoor.

https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/