Reverse Engineering
@reverseengineeringx
4.75K
subscribers
106
photos
1
video
18
files
458
links
Everything is open-source.
The official community group:
@reverseengineeringz
Download Telegram
Join
Reverse Engineering
4.75K subscribers
Reverse Engineering
https://github.com/NationalSecurityAgency/ghidra/issues/376
GitHub
API - How can i return Assembly/Decompiled Code · Issue #376 · NationalSecurityAgency/ghidra
From Jython APIs how can i retrieve raw assembly and/or decompiled code from a function? I can't find anything related. Thanks.
Reverse Engineering
https://www.vdalabs.com/2019/03/09/automating-ghidra-writing-a-noscript-to-find-banned-functions/
VDA Labs
Blog - VDA Labs
As leaders in information security we continue to train ourselves so that the services you receive are the best they can be.
Reverse Engineering
https://youtu.be/u15-r5Erfnw
YouTube
Ghidra: Data Type Manager / Archives and Parse C Source... (resolve function signatures)
Download Windows API Ghidra Data Type Archives (the .gdt files): https://github.com/0x6d696368/ghidra-data/tree/master/typeinfo
Obviously you can also right click on a Data Type Archive and select "new" or hit "T" in the Listing View to define a new data…
Reverse Engineering
https://reverseengineering.stackexchange.com/questions/16490/how-to-decompile-with-hex-rays-via-a-python-api
Reverse Engineering Stack Exchange
How to decompile with Hex Rays via a Python API?
If i have a large set of files and I'd like to run Hex-rays over them to produce output as C - can I do so in python?
I see there is IDA Python
And I see Hex-rays has a C++ SDK
Is there a python He...
Reverse Engineering
https://www.youtube.com/playlist?list=PLXOtMhdRHh8GvATwwwIzgzWBrHtiqUZLC
YouTube
null - YouTube
Reverse Engineering
https://www.gnu.org/software/libc/manual/pdf/libc.pdf
Reverse Engineering
https://github.com/m0n0ph1/malware-1
GitHub
GitHub - m0n0ph1/malware-1: Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code. - m0n0ph1/malware-1
Reverse Engineering
https://link.medium.com/RTCx1uvHeZ
Medium
Triton Is the World’s Most Murderous Malware, and It’s Spreading
It was discovered in the Middle East, but the hackers behind it are now targeting companies in North America and other parts of the world
Reverse Engineering
https://www.riverloopsecurity.com/blog/2019/05/pcode/
River Loop Security
Working With Ghidra’s P-Code To Identify Vulnerable Function …
Cybersecurity solutions for the whole lifecycle of IoT and embedded systems.
Reverse Engineering
http://ghidra.re/courses/GhidraClass/Intermediate/HeadlessAnalyzer.html#1.0
Reverse Engineering
https://aboureada.com/cheat_sheet/2017/12/20/radare2_cheat_sheet.html
{ Anas Aboureada }
Radare2 cheat Sheet
Blog and website of Anas Aboureada, blogging mainly about cyber security. Opinions expressed are mine.
Reverse Engineering
Qt Reverse Engineering.pdf
143.9 KB
Reverse Engineering
https://github.com/d35ha/xLogger
GitHub
GitHub - d35ha/xLogger: Simple windows API logger
Simple windows API logger. Contribute to d35ha/xLogger development by creating an account on GitHub.
Reverse Engineering
https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html
SEI Blog
Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra
This post explores how to use the new OOAnalyzer Ghidra Plugin to import C++ class information into the NSA's Ghidra tool and interpret results in the Ghidra SRE framework.
Reverse Engineering
https://searchsecurity.techtarget.com/definition/metamorphic-and-polymorphic-malware
Security
metamorphic and polymorphic malware
Learn how to detect and prevent metamorphic and polymorphic malware, two types of malicious software that change their code as they propagate through a system.
Reverse Engineering
https://www.youtube.com/watch?v=Jsohdah8ZCg
YouTube
Malware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses
Concepts and terminology of encrypted viruses and self-mutating viruses.
My malware analysis course for beginners: https://www.udemy.com/course/windows-malware-analysis-for-hedgehogs-beginner-training/?referralCode=EE0E2DC9FA7388FF25B7
Buy me a coffee: https://ko…
Reverse Engineering
https://www.youtube.com/watch?v=Uaunytw-otk
YouTube
DEF CON 24 - The Remote Metamorphic Engine - Detecting - Evading - Attacking
Amro Abdelgawad Founder, Immuneye
As a matter of fact, it is all about time to reverse engineer the most complex piece of code. Code complicity techniques are usually used just to increase the time and effort needed for reverse engineering. The desired effect…
Reverse Engineering
https://remnux.org/docs/containers/malware-analysis/
Reverse Engineering
https://www.youtube.com/watch?v=RUmYojxy3Xw
YouTube
Creating SNORT Rules
Summary
Several examples of Snort rule creation and triggered alerts.
4:22 - Adding custom rules to Snort configuration
4:47 - Create custom rules file
5:40 - FTP alert rule
14:57 - Manually running Snort
17:53 -…
Reverse Engineering
https://github.com/multiarch/qemu-user-static
GitHub
GitHub - multiarch/qemu-user-static: :earth_africa: `/usr/bin/qemu-*-static`
:earth_africa: `/usr/bin/qemu-*-static`. Contribute to multiarch/qemu-user-static development by creating an account on GitHub.
Reverse Engineering
https://github.com/ALSchwalm/dwarfexport
GitHub
GitHub - ALSchwalm/dwarfexport: Export dwarf debug information from IDA Pro
Export dwarf debug information from IDA Pro. Contribute to ALSchwalm/dwarfexport development by creating an account on GitHub.
TWeb.init({scrollToPost:'reverseengineeringx/408'});