Reverse Engineering – Telegram
Reverse Engineering
4.75K subscribers
106 photos
1 video
18 files
458 links
Everything is open-source.

The official community group: @reverseengineeringz
Download Telegram
Screenshot at 2019-01-24 11-14-21.png
113.9 KB
R2 commands
agc
aga
agx
pdd
axt @@ str.*
Practical Malware Analysis Sam Class Course
amber a reflective PE packer for bypassing security products and mitigations
https://github.com/EgeBalci/Amber
A reverse shell is a shell initiated from the target host back to the attack box which is in a listening state to pick up the shell. A bind shell is setup on the target host and binds to a specific port to listens for an incoming connection from the attack box. In malicious software a bind shell is often revered to as a backdoor.

https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/
netstat -lptu # print TCP/UDP open ports with PID/service name
API Monitor is a free software that lets you monitor and control API calls made by applications and services. Its a powerful tool for seeing how applications and services work or for tracking down pro
Decompiling and running flash programs using SWF file player + FFdec
EXPLORING THE PE FILE FORMAT VIA IMPORTS

DLL Name RVA: A pointer (address) to the name of the imported DLL.

Import Address Table (IAT) RVA is populated by the loader when the executable and its imported DLLs are mapped into memory, and it is a table of pointers to the imported functions. Each entry in the table is called a “thunk” and the table is referred to as a “thunk table.” With that in mind, the RVA in this field points to the address of the imported function within the IAT

https://malwology.com/2018/10/05/exploring-the-pe-file-format-via-imports/